LinuxLink Login   |   1.866.392.4897 |   sales@timesys.com    |  Contact Us          
Discovering and Fixing Vulnerabilities Quickly: Securing Embedded Open Source IoT Devices in the Wild

Discovering and Fixing Vulnerabilities Quickly: Securing Embedded Open Source IoT Devices in the Wild

The web of Internet of Things (IoT) devices continues to grow each day. In fact, by the year 2020, Gartner predicts that 95% of new electronic product designs will contain IoT technology; Forbes expects at least 80 billion IoT devices to be available by 2025. But with such a vast number of devices in use across the world, how can you hope to find flaws and address vulnerability concerns in a timely manner within your own IoT products?

Continue reading “Discovering and Fixing Vulnerabilities Quickly: Securing Embedded Open Source IoT Devices in the Wild” »

Open Source CVE Monitoring and Management: Cutting Through the Vulnerability Storm

Open Source CVE Monitoring and Management: Cutting Through the Vulnerability Storm

14,000+ CVEs were discovered in 2017. In April of 2018 the CVE list had surpassed 100,000 entries, and that number grows every day. So how do you protect your embedded devices and open source embedded systems in IoT and IIoT deployments from this endless onslaught of security threats?

With unpredictable and fast-paced discoveries, managing endless threats and maintaining the security of your embedded software throughout the product lifecycle can be a significant challenge — and a time-consuming one. If your plan is to weather the vulnerability storm yourself, then you’ll need to ask yourself the following questions:
Continue reading “Open Source CVE Monitoring and Management: Cutting Through the Vulnerability Storm” »