Cybersecurity

Blog articles, webinars, and podcasts you need to gain a deeper understanding of how to keep your devices secure during their lifecycle.

Cyber Resilience Act reporting requirements

Transparent reporting mechanisms are essential for effective cybersecurity governance. Equipment manufacturers must establish clear protocols for reporting cybersecurity incidents, both internally and to relevant stakeholders. This transparent approach enables swift responses to cyber threats, minimizing potential damage and enhancing trust among customers and regulatory authorities.

CRA conformity assessment

Before launching a new product on the market, equipment manufacturers must conduct a conformity assessment to validate that the CRA requirements have been met. Discover the steps to follow.

What is Software Composition Analysis - The Embedded Kit

What is Software Composition Analysis?

Software Composition Analysis (SCA) involves identifying and managing the various components and dependencies in software applications to ensure security and compliance. SCA tools help detect vulnerabilities and licensing issues in third-party components, providing continuous monitoring and integration with development workflows to enhance the robustness of software projects. Let's dive deep into this systematic approach to fortifying embedded systems.

Example of Software Bill of Materials (SBOM) - Welma Yocto Linux The Embedded Kit

What is a Software Bill of Materials (SBOM)?

Having a comprehensive understanding of your software's components and dependencies has become vital with the increasing complexity of software applications and the growing concern of supply chain attacks.

On this page, we will guide you through the process of generating, managing, and using SBOM (Software Bill of Materials) to enhance your software development practices. By leveraging SBOM security, you can enhance your software development processes, strengthen supply chain security, and protect your organization against potential threats.

Vigiles vs cve-check vs Black Duck vs CVE Scan _ SCA tool comparison for embedded Linux systems

Black Duck, cve-check, Vigiles: SCA tool comparison for embedded Linux

With the upcoming cybersecurity regulations, you will probably be expected to detect, monitor and communicate on the vulnerabilities of your embedded Linux systems. That’s where Linux vulnerability scanners come in handy.
Dive into the strengths and weaknesses of four prominent software composition analysis (SCA) tools to identify and mitigate the vulnerabilities of your embedded Linux systems: cve-check by the Yocto Project, Vigiles by Timesys, Black Duck by Synopsys, and CVE Scan by The Embedded Kit.

Securing embedded devices: navigating the implications of the EU Cyber Resilience Act

Securing embedded devices: navigating the implications of the EU Cyber Resilience Act

The advent of embedded devices has ushered in remarkable advancements across industries, yet with connectivity comes a heightened susceptibility to cybersecurity threats. As regulatory bodies worldwide respond to this pressing concern, the European Union is at the forefront with the EU Cyber Resilience Act (CRA), aimed at fortifying the security of embedded devices. While the CRA awaits finalization by the European Commission, its proposed directives suggest a significant overhaul in cybersecurity requirements for European equipment manufacturers. Let's delve into the potential implications of the CRA and the additional measures manufacturers must consider to secure their embedded devices and ensure compliance.

The Embedded Kit in Embedded Executive podcast by Embedded Computing Design - 2024

Embedded Linux development challenges may not be what you think – Embedded Executive Podcast

Embedded systems have become ubiquitous in our modern world, powering everything from smart appliances to industrial machinery. At the heart of many of these systems lies Linux, the open-source operating system renowned for its flexibility and customization options. However, navigating the intricacies of embedded Linux can be daunting, especially for those unfamiliar with its nuances.

At The Embedded Kit, we’ve conducted a study and gained valuable insights into the challenges and opportunities facing OEMs in the embedded Linux landscape. Discover the key takeaways from the study Pierre Gal shared with Rich Nass on the Embedded Executive podcast.

The Embedded Kit x SimpleSwitch - From Avnet Embedded SMARC module evaluation to production

Tria SimpleSwitch x The Embedded Kit for SMARC modules

When evaluating a system on module for your next generation product, the focus naturally shifts towards module performance and its ability to run your business applications.
However, the journey takes a different turn once hardware selection is made and the path to production begins. It becomes imperative to customize your system to ensure its security. In this article, we delve into two complementary solutions that facilitate Tria (ex Avnet Embedded) SMARC module evaluation and accelerate the transition to production: SimpleSwitch and The Embedded Kit.