listing-hero-image

Blog

LYNX MOSA.ic

Showing 1- of 12

PARTNER BLOG

The Role of Runtime Protection in Securing Embedded Devices

Learn from our partner, RunSafe Security, how runtime protection is increasing the...

commercial airplane at night
BLOG

Seize the Edge: Introducing the New Lynx

After decades of pioneering mission-critical software solutions, we are launching...

BLOG

What is SR-IOV and Why is It Important for embedded devices?

BLOG

Linux Polkit: Implementing user space authorization on embedded platforms

BLOG

SBOM Generation and Vulnerability Monitoring for Debian

BLOG

Linux Kernel Security: dm-crypt with “trusted keys” using TEE backend

BLOG

DM-Verity Without an Initramfs

BLOG

What is Cache Coloring and How Does it Work?

BLOG

Securing your Linux Configuration (Kernel Hardening)

BLOG

Securing U-Boot: A Guide to Mitigating Common Attack Vectors

BLOG

What Are the Most Popular Real-Time Operating Systems in 2024?

BLOG

RTOS and Linux - Their Evolving Roles in Aerospace and Defense

Seize the Edge