Implementing Security in Embedded Linux Systems

While hackers had their sights on IT, embedded devices for the most part were spared. Until recently. Hackers have begun targeted more traditional embedded platforms. Ironically like in IT, fame is the initial motivator but before long financial gain and outright destruction will most likely be the end game.

Read more...





Ensuring Trust in IoT Edge Devices, Embedded Computing Design, CA

With each end node added to the Internet of Things, vulnerability to cyberattack increases exponentially. Securing edge devices is no easy task, however, as resource constraints, cost, and the diverse nature of IoT systems inhibit the effectiveness of traditional cyber security technologies.

Read more...




MontaVista Carrier Grade Edition 7

MontaVista CGE 7 delivers reliable, secure, and serviceable Linux to interconnected embedded devices and high performance net-works.

In recent years, there has been a change in the way Network Equip-ment Providers (NEPs) and Telecom companies develop their net-work infrastructure applications.

Read more...




IoT - Secure IoT Gateway: Cavium Octeon Tx + MontaVista CGX

MontaVista BLOG

Truth or myth? Five common assumptions about the implementation of secure boot in embedded Linux-based devices

June 25, 2018
A PC connected to the internet is vulnerable to attack in a multitude of ways, but the authenticity of the operating system that it runs is not in question. If you switch on a PC and the Windows® logo flashes up on the screen, you can be very confident that the computer is running a safe and valid version of the Windows OS. You have this assurance because of secure boot, a standard authentication function that runs at power-up to authenticate the OS image before it is launched by the CPU. It

Home-grown or commercial Linux: a binary choice?

March 17, 2018
Home-grown or commercial Linux: a binary choice? Are you a home-grown Linux user? Or do you use a commercial-grade Linux distro provided by a third party such as MontaVista? It’s customary to present this as a binary choice. But in the real world of the embedded developer, it’s becoming incre


Tweet @MVista