listing-hero-image

Blog

LYNX MOSA.ic

Showing 1- of 35

PARTNER BLOG

The Role of Runtime Protection in Securing Embedded Devices

Learn from our partner, RunSafe Security, how runtime protection is increasing the...

commercial airplane at night
BLOG

Seize the Edge: Introducing the New Lynx

After decades of pioneering mission-critical software solutions, we are launching...

BLOG

What is SR-IOV and Why is It Important for embedded devices?

BLOG

Linux Polkit: Implementing user space authorization on embedded platforms

BLOG

SBOM Generation and Vulnerability Monitoring for Debian

BLOG

Linux Kernel Security: dm-crypt with “trusted keys” using TEE backend

BLOG

DM-Verity Without an Initramfs

BLOG

What is Cache Coloring and How Does it Work?

BLOG

Securing your Linux Configuration (Kernel Hardening)

BLOG

Securing U-Boot: A Guide to Mitigating Common Attack Vectors

BLOG

What Are the Most Popular Real-Time Operating Systems in 2024?

BLOG

RTOS and Linux - Their Evolving Roles in Aerospace and Defense

SBOM Generation and Vulnerability Monitoring for the Ruby Ecosystem

SBOM Generation and Vulnerability Monitoring for the Go Ecosystem

SBOM Generation and Vulnerability Monitoring for the Hackage/Haskell Ecosystem

SBOM Generation and Vulnerability Monitoring for Debian Containers

Securing Your Software: Generating SBOMs from Linux Binaries and Scanning for CVEs Without Source Code

Elevating Your SCA Management with the Power of Vigiles-CLI

Linux Polkit: Implementing user space authorization on embedded platforms

Discretionary Access Control (DAC) Hardening

Stay in your workflow with Command Line Interface for Timesys’ Embedded Board Farm

Vigiles Quick Start … because securing your products doesn’t have to be hard

New security offering with NXP: Ensure embedded system security throughout product lifecycle

Open Source CVE Monitoring and Management: Learn the Latest at Embedded Linux Conference 2019

Secure Product Management: Reducing Security Trade-offs Part 2

Embedded World Highlights: Build it faster & with stronger security

The Risks of a ‘Stale, Abandoned’ Product

Another Record Year for Vulnerabilities … Time to Join the CIA?

Vulnerabilities keep piling up… time to make security a product differentiator?

Patch management for better embedded system security

Security testing of embedded open source systems creates a stronger enterprise security posture

Vulnerability management for Internet of Things and embedded systems

‘Complexity is the enemy of security’ … especially in IoT

Meltdown and Spectre vulnerabilities

Seize the Edge

The future won’t wait—neither should you. Let’s build, secure, and accelerate your next mission together. Contact us today to get started.