A Timesys Deep Dive Embedded Systems Newsletter

April 2022

Cybersecurity in the News: The 11 CVEs You Need to Know About

Have you heard about this BusyBox flaw, these Azure Defender critical hijacking bugs, or this damaging heap buffer overflow flaw? With an average of 50 new CVEs every day, how do you cut through the noise and take action on the vulnerabilities that pose the largest threat to your device?

We’ve launched the Timesys CVE Dashboard, updated weekly with details on the dangerous security vulnerabilities that could be affecting your device.

Take me to the CVE Dashboard
Meet VigiShield Secure by Design

Security, simplified.

Security is a complex, time-consuming, ever-evolving process that requires deep expertise across many disciplines. With VigiShield Secure by Design, we’ve distilled the security feature implementation process down into an easy-to-understand, PSA certified, maintainable Yocto security layer that can be configured to meet your current customer and regulatory (e.g. NISTIR 8259A and ETSI EN 303) requirements.

VigiShield leverages widely used open source technologies, enables underlying hardware capabilities for best performance, and implements the security best practices recommended by regulatory and industry-specific bodies (FDA, IEC, etc).

With security built-in using VigiShield, device manufacturers can focus more on innovation during the product development process and get to market faster.

The results are in!

Get your copy of the 2022 Timesys Cybersecurity Survey results! Featuring insights from more than 100 industry professionals, this infographic presents key learnings on the state of the industry for cybersecurity.

Learn with Timesys

Read up on embedded security with our two latest blogs

DM-Verity Without an Initramfs

Learn how you can implement file system verification on your embedded system without the use of an initramfs. This can significantly save boot time and storage requirements in many situations.

Securing U-Boot: A Guide to Mitigating Common Attack Vectors

Learn about ways in which you can protect and secure U-Boot implementations on your embedded systems. This involves signed FIT images, environment protections, and serial console disablement methods.

Upcoming Events

Conferences Around the World You Don’t Want to Miss

Embedded Online Conference

A conference for embedded systems engineers

April 25-29, online

So much learning to do, and so little time. Don’t worry if you’re joining late — many talks are available on-demand.

Be sure to stop by the “demo” area to see our new Embedded Board Farm video!

Cyburgh

Cybersecurity industry event

May 4, Pittsburgh, PA

Join us in our hometown for the 7th annual Cyburgh, a forum for cybersecurity, IT, and business professionals to engage with and learn from peers, thought leaders, and solution providers.

Our very own Al Feczko will present a tech talk on software supply chain security

2nd European Medical Device & Diagnostic Cybersecurity + Software Development & Compliance

Joint live conference

May 17-18, Brussels

We are thrilled to be sponsoring this year’s event, and our very own Maciej Halasz will be presenting on securing the open source embedded software supply chain for medical devices.

Embedded Technology Convention USA 2022

Embedded Technologies & Systems Showcase

June 8-9, Las Vegas, NV

Join us at the Embedded Tech Convention with 5000 of our closest friends! Discover the latest technological innovations and trends, expand your industry knowledge and extend your global professional network.

Embedded World 2022

Exhibition & Conference

June 21-23, Nuremberg

Will you be at Embedded World this year? We’re excited to showcase our latest security solutions as a featured partner with our friends at STMicroelectronics.

Security Vulnerability Management 101

Tool & Techniques to Monitor and Remediate Vulnerabilities in Your SBOM
June 30 @ 12 PM ET / 9 AM PT

In this monthly live webinar and Q&A session, you’ll learn:

– Why you need to manage your open-source software risks 
– How to generate an accurate SBOM (Software Bills of Materials) and why it matters
– Tools and techniques to monitor and remediate vulnerabilities in your SBOM
– And much more!

Yes! I want to register for the live webinar and Q&A

Subscribe to our newsletter so you don’t miss a thing.