On-Demand webinar

Hardened Yocto

Overcoming Challenges with Building a Secure Embedded Linux OS

Originally delivered at embeddedworld North America in 2024, this on-demand webinar is a discussion of security from a Yocto-specific perspective. The Yocto Project is widely used in embedded systems, billing itself as “the de facto industry standard tool kit for building custom embedded Linux operating systems.” It is customizable for any size system and enjoys a large third-party ecosystem to extend its feature set. Star Lab’s work involves developing novel security solutions for mission critical embedded Linux systems. As such, he is intimately familiar with the many challenges and opportunities presented by the Yocto Project when attempting to develop a secure-by-default image.

Ben surveys some of the major security technologies included in the Yocto Project, either as core components or in third-party layers. These include general kernel and userspace hardening, SELinux and LUKS encryption. He also discusses some of the best practices for using these technologies, and the unexpected challenges he has encountered when integrating them alongside Star Lab’s technologies. Lastly, he also discusses how Yocto enables many of Star Lab’s security technologies in a way that would not be possible with a binary distribution. 

 
 

On-Demand webinar

Cybersecurity - What is it and Why Do you Need It

Cybersecurity is the practice of protecting systems, networks, and data from digital attacks, unauthorized access, damage, or theft. And there’s no single method of implementing it and ensuring that your system will be completely safe. In this session, we will look at some best practices of cybersecurity, and what’s best for your application.

 
 

On-Demand webinar

AI in Industrial, including Predictive Maintenance

Machine learning is not new to industrial/automation/robotics equipment. But the capabilities are expanding, and they will continue to do so moving forward. As new algorithms come about and vision system get better, you’ll see huge improvements in productivity, quality, and security. This session will look into some of those applications and where gains can be made thanks to the use of AI.

 
 

On-Demand webinar

Understand the Impacts of AI/ML on Your Industrial IoT Platforms

AI is now all around us. It can be found in nearly every facet of our lives. And the industrial, automation, robotics, and manufacturing sectors are front and center when it comes to AI and ML deployments. As the technology matures, you’ll see huge improvements in productivity, quality, and security. The talks in this session will hone in on these advancements and how they can be deployed in your industrial application.

 
 

On-Demand webinar

From wearables to imaging systems, AI is being deployed across the board in medical/healthcare devices. This category brings in a few extra variables, including security that needs to be top notch. In this session, we will look at how low-power devices can implement AI in the wearables space, and what’s available in the high end.

 
 

On-Demand webinar

Kevlar Embedded Security's new data protection capabilities are designed to defeat efforts to access or capture critical data on Linux-based embedded systems at-rest and at runtime. These compliment the existing capabilities to provide cyber resilience for embedded systems through several mechanisms that build security into the design from the start.

The new data protection capabilities include:

  1. Full Disk Encryption for Data Protection At-Rest

  2. Boot-time Full Disk Integrity Verification

  3. Containerization Isolation to Protect Applications at Runtime

 
 

On-Demand webinar

Bolt-on Security, the concept that security is implemented later in the development lifecycle, has proven itself insufficient against attacks. Stuxnet, Verkada, and perhaps the lesser known 2015 Jeep hack, to name a few, have demonstrated that methodologies from enterprise security simply are not sufficient for embedded systems. Vulnerability scanning, observability, CVE patching, and other methods while important, just are not enough.

We need a new approach to securing embedded systems.

Queue Built-in Security, a modern approach promoting the implementation of secure methodologies as early in the device lifecycle as possible.

In this webinar, Matthew Fahrenkrug will discuss why you should move to a built-in security approach and outline practical tips for both the practitioner and program leaders to help you get there:
1. Update Your Threat Model
2. Start Early
3. Look at the Host Device
4. You Don’t Have to be the Expert

 
 

On-Demand webinar

The use of virtualization in industrial and defense systems in United States A&D applications has been on the rise for years. The benefits of new technologies are almost always offset by the introduction of new attack surfaces, and hypervisor-based virtualization is no exception. With new attack surfaces comes the need for new and innovative security solutions.

In this webinar, technology protection expert David Esler discusses the unique threat landscape posed to virtualized systems.