LinuxLink Login   |   1.866.392.4897 |   sales@timesys.com    |  Contact Us          
Open Source CVE Monitoring and Management: Learn the Latest at Embedded Linux Conference 2019

Open Source CVE Monitoring and Management: Learn the Latest at Embedded Linux Conference 2019

Every week, more than 300 new vulnerabilities affecting software systems are disclosed by security reporting services such as the Common Vulnerabilities & Exposures (CVE) database operated by the US National Institute of Standards and Technology (NIST).

If you develop embedded systems or embedded devices, keeping pace with the constant flood of new vulnerabilities, knowing which directly affect your products, and having the ability to quickly analyze them, is essential in keeping your products secure throughout their lifecycle.

Continue reading “Open Source CVE Monitoring and Management: Learn the Latest at Embedded Linux Conference 2019” »

Introducing TRST Product Protection Solutions for Devices Based on Embedded Open Source Software

Introducing TRST Product Protection Solutions for Devices Based on Embedded Open Source Software

Traditional IT security isn’t protecting embedded open source systems in IoT and IIoT deployments

Here at Timesys, we’ve been noticing some concerning trends when it comes to open source embedded system security and the rise of Internet of Things (IoT) and other intelligent devices. We’ve been hard at work developing a solution that can help ease your burden of carefully developing, monitoring, and maintaining security measures on your devices.

More and more IoT and IIoT products are being built with open source embedded software — which we think is great. But because of the growing number of developers turning to open source components for their products, security processes can’t keep up with the rate at which open source devices are being deployed. Traditional IT security has been built with secure perimeters and trusted environments, and has fewer intelligent devices and smaller attack surfaces. But those parameters have begun to change. And with more products to target, the number of security threats will only increase as well.

Continue reading “Introducing TRST Product Protection Solutions for Devices Based on Embedded Open Source Software” »

Webinar Series: Reduce Risk with RISC – Designing and Maintaining Secure Embedded Linux Devices with Advantech RISC Platforms

Webinar Series: Reduce Risk with RISC – Designing and Maintaining Secure Embedded Linux Devices with Advantech RISC Platforms

The security of your device systems and software is critical for your customers. Heightened cyber-attacks, stringent privacy requirements, and increased breach risks all demand that security is baked into your product design, not slapped on as an afterthought.

Continue reading “Webinar Series: Reduce Risk with RISC – Designing and Maintaining Secure Embedded Linux Devices with Advantech RISC Platforms” »

Webinar: Building Embedded Software Efficiently with an IDE

Webinar: Building Embedded Software Efficiently with an IDE

Discover IDE-assisted software development best practices that can help you minimize the number of challenges you encounter and reduce development delays when building your value-add embedded application.

This four-session webinar series will utilize open source Linux and Timesys’ TimeStorm IDE for embedded application- and system-level development. You’ll see how TimeStorm provides a consistent development experience while providing application developers with the flexibility they need to be more efficient and productive.

Continue reading “Webinar: Building Embedded Software Efficiently with an IDE” »