LinuxLink Login   |   1.866.392.4897 |   sales@timesys.com    |  Contact Us            English EN French FR German DE Japanese JA
CVE Monitoring & Management: Timesys’ Akshay Bhat Offers Security Guidance for Embedded Open Source Systems Part 2

CVE Monitoring & Management: Timesys’ Akshay Bhat Offers Security Guidance for Embedded Open Source Systems Part 2

As discussed in last week’s posting, central to the device maintenance process and keeping devices secure after they’ve been deployed is the ongoing monitoring and managing of CVEs that affect your product components. Therefore, it’s essential to have a clear view of relevant CVEs because there are many moving parts that need to be managed.

Adam Boone: Along those lines, you mentioned monitoring patches and software upgrades as one of the moving parts to be managed in a security maintenance program. What’s the challenge there?

Akshay Bhat: Patch management alone is always challenging, especially if you have a large number of open source components. You need to evaluate when to apply a patch, how the patch affects other components, what testing needs to be conducted, whether a patched component can be backported to earlier versions, and so on.

Continue reading “CVE Monitoring & Management: Timesys’ Akshay Bhat Offers Security Guidance for Embedded Open Source Systems Part 2” »

CVE Monitoring & Management: Timesys’ Akshay Bhat Offers Security Guidance for Embedded Open Source Systems Part 1

CVE Monitoring & Management: Timesys’ Akshay Bhat Offers Security Guidance for Embedded Open Source Systems Part 1

Timesys’ Director of Engineering, Akshay Bhat, presented a session on Open Source Security at the Embedded Linux Conference North America 2019 in August. For this two-part Q&A interview, our VP of Marketing Adam Boone asked Akshay to share his views on the challenges and best practices for maintaining security in Open Source Embedded System products.

Adam Boone: Why should product developers and engineering managers be familiar with CVEs and make an effort to monitor them?

Akshay Bhat: I think everyone recognizes it is important to bring products to market that are secure and that stay secure throughout their deployment lifecycles.

Continue reading “CVE Monitoring & Management: Timesys’ Akshay Bhat Offers Security Guidance for Embedded Open Source Systems Part 1” »

Open Source CVE Monitoring and Management: Learn the Latest at Embedded Linux Conference 2019

Open Source CVE Monitoring and Management: Learn the Latest at Embedded Linux Conference 2019

Every week, more than 300 new vulnerabilities affecting software systems are disclosed by security reporting services such as the Common Vulnerabilities & Exposures (CVE) database operated by the US National Institute of Standards and Technology (NIST).

If you develop embedded systems or embedded devices, keeping pace with the constant flood of new vulnerabilities, knowing which directly affect your products, and having the ability to quickly analyze them, is essential in keeping your products secure throughout their lifecycle.

Continue reading “Open Source CVE Monitoring and Management: Learn the Latest at Embedded Linux Conference 2019” »

Vulnerability Management: Making proactive security maintenance a part of your product support processes

Vulnerability Management: Making proactive security maintenance a part of your product support processes

Too often, it seems the first notification of a software vulnerability comes from an affected customer or the publicity surrounding a high-profile data breach. Then follows the mad scramble to mitigate the vulnerability, notify customers, update products in the field and so on.

This reactive approach to vulnerability management for your embedded system products simply doesn’t fly in today’s heightened vulnerability environment.

Continue reading “Vulnerability Management: Making proactive security maintenance a part of your product support processes” »

Security Maintenance: Three essential tasks for maintaining embedded system security after release

Security Maintenance: Three essential tasks for maintaining embedded system security after release

The product development and release maintenance cycle has many predictable elements.

You know you will face time constraints for engineering to develop, test and prepare the product for production release based on the product roadmap and schedule. You’ll likewise face constraints around engineering resources, including the people and tools needed to hit the development targets.

Continue reading “Security Maintenance: Three essential tasks for maintaining embedded system security after release” »

Secure Product Management: Reducing Security Trade-offs Part 2

Secure Product Management: Reducing Security Trade-offs Part 2

As discussed in last week’s posting, security often ends up taking a backseat to other considerations when you are bringing products to market or supporting ones already in production deployment.

Product managers often are faced with delivering baseline product functionality and dealing with constraints around timelines and budget. That means broader security considerations fall out of the product when these constraints force trade-offs and fundamental product requirements take priority.

Continue reading “Secure Product Management: Reducing Security Trade-offs Part 2” »

Secure Product Management: Reducing Security Trade-offs Part 1

Secure Product Management: Reducing Security Trade-offs Part 1

There is a decades old principle in managing any project called the “Triple Constraint” or sometimes “The Iron Triangle.”

It states that any project involves trade-offs between three constraints:

  1. Time: project schedule
  2. Cost: available resources in terms of people and budget)
  3. Scope: volume and comprehensiveness of features, functions, operational performance

Continue reading “Secure Product Management: Reducing Security Trade-offs Part 1” »

CVE Monitoring: Knowledge of vulnerabilities and the power to secure your products

CVE Monitoring: Knowledge of vulnerabilities and the power to secure your products

Knowledge is power.

And knowledge of vulnerabilities affecting your products gives you the power to make them more secure.

That’s why our new Vigiles vulnerability monitoring and management service incorporates the industry’s first Targeted Vulnerability & Mitigation Tracker that pinpoints vulnerabilities affecting your specific products.

Continue reading “CVE Monitoring: Knowledge of vulnerabilities and the power to secure your products” »

Vulnerability Management: Automation ends the pain of manual DIY security

Vulnerability Management: Automation ends the pain of manual DIY security

Every week, more than 300 new vulnerabilities affecting software systems are disclosed by security reporting services such as the Common Vulnerabilities & Exposures (CVE) database operated by the US National Institute of Standards and Technology (NIST).

These vulnerabilities run the gamut of low risk security concerns to critical issues. Some vulnerabilities can allow an attacker to take control of a company’s IT systems, gain access to sensitive information, even modify or otherwise compromise critical company operational processes and data.

Continue reading “Vulnerability Management: Automation ends the pain of manual DIY security” »

Bring more secure products to market now: Meet Timesys Vigiles™

Bring more secure products to market now: Meet Timesys Vigiles™

Constant vigilance is the key to bringing truly secure products to market.

Constant vigilance is what you get with our new real-time security monitoring and management service, Timesys Vigiles.

We named the new service after the famed city watchmen of ancient Rome. Like them, Vigiles is constantly watching, scanning for threats, and pinpointing the security risks that need to be managed.

Continue reading “Bring more secure products to market now: Meet Timesys Vigiles™” »

Click to Hide Advanced Floating Content

Timesys Vigiles™
Vulnerability Management