

5 Security Best Practices for Linux at The Intelligent Edge
Published by Wind River Systems
In 2022, more than 25,000 CVEs were reported, a 25% increase over 2021.
New cybersecurity mandates and stricter supply chain security policies are direct responses to the increasing threat landscape for critical infrastructure systems. Software developers building and deploying Linux platforms for intelligent edge devices and systems are feeling the impact.
A stronger security posture applies to new software designs as well as active deployments, and a full-lifecycle approach to security must be a top priority. Seth Cramer and Arlen Baker of Wind River® discuss the five security best practices for software teams building Linux platforms deploying into the intelligent edge:
- Understanding your risk tolerance and the security policy to put in place
- Using tools to quickly identify and respond to any CVEs in your code
- Prioritizing and preventing security technical debt
- Maintaining the required security posture throughout the lifecycle
- Learning from a real-world, mid-lifecycle security case study
Watch the webinar now to learn more.
Download Now
Required fields*
By requesting this resource you agree to our terms of use. All data is protected by our Privacy Notice. If you have any further questions please email dataprotection@headleymedia.com.
Mobile Security, Email Security, Network Security, Security Solutions, Security Management, Email Security, Cloud Security