Wind River Systems
flow-image

5 Security Best Practices for Linux at The Intelligent Edge

Published by Wind River Systems

In 2022, more than 25,000 CVEs were reported, a 25% increase over 2021.

New cybersecurity mandates and stricter supply chain security policies are direct responses to the increasing threat landscape for critical infrastructure systems. Software developers building and deploying Linux platforms for intelligent edge devices and systems are feeling the impact.

A stronger security posture applies to new software designs as well as active deployments, and a full-lifecycle approach to security must be a top priority. Seth Cramer and Arlen Baker of Wind River® discuss the five security best practices for software teams building Linux platforms deploying into the intelligent edge:

  1. Understanding your risk tolerance and the security policy to put in place
  2. Using tools to quickly identify and respond to any CVEs in your code
  3. Prioritizing and preventing security technical debt
  4. Maintaining the required security posture throughout the lifecycle
  5. Learning from a real-world, mid-lifecycle security case study

Watch the webinar now to learn more.

Download Now

box-icon-download

Required fields*

Please agree to the conditions

By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@headleymedia.com .

Related Categories Protection Devices