Making the Grade with Linux and Cybersecurity at the Intelligent Edge

October 22, 2020 Brandon Lewis

As intelligent edge deployments accelerate, we have reached a crossroads where many are being forced to choose between the accessibility, ease of use, flexibility, and leading-edge capabilities of open source software and the safety and security of systems in the field. How we proceed has the potential to lead massive transformation in the embedded industry.

“Using open source early in the proof-of-concept cycle means taking advantage of the rapid pace of open source innovation,” says Matt Jones, Chief Architect at Wind River. “Taking your solution to market comes with additional measures meant to protect your device throughout its lifecycle.”

Learn how you can use Linux to capitalize on both the proof-of-concept and go-to-market phases of the development lifecycle, tune in for a fast-based micro video series, “Making the Grade with Linux and Cybersecurity at the Intelligent Edge,” hosted by Wind River’s Michael Mehlberg. The in-depth, seven-part series teaches viewers the cybersecurity, compliance, and performance requirements for electronic systems at the intelligent edge, as well as how to implement them, in less than 25 minutes.

The topics are:

Click here to watch the seven-part series

Mehlberg, a 17-year veteran of anti-tamper, reverse-engineering, threat modeling, risk assessment, and system security technology will guide you through these and other aspects of the secure development lifecycle so you can realize the potential of using robust open-source Linux at the intelligent edge.

To begin watching “Making the Grade with Linux and Cybersecurity at the Intelligent Edge,” click here.

To discover where your intelligent edge systems might be vulnerable, click here.

To get in touch with a security expert, click here.

To register, please click HERE.

About the Author

Brandon Lewis

Brandon Lewis, Editor-in-Chief of Embedded Computing Design, is responsible for guiding the property's content strategy, editorial direction, and engineering community engagement, which includes IoT Design, Automotive Embedded Systems, the Power Page, Industrial AI & Machine Learning, and other publications. As an experienced technical journalist, editor, and reporter with an aptitude for identifying key technologies, products, and market trends in the embedded technology sector, he enjoys covering topics that range from development kits and tools to cyber security and technology business models. Brandon received a BA in English Literature from Arizona State University, where he graduated cum laude. He can be reached by email at

Follow on Twitter Follow on Linkedin Visit Website More Content by Brandon Lewis
Previous Article
SRAM PUF Provides an Unclonable Security Mechanism
SRAM PUF Provides an Unclonable Security Mechanism

In practice, an unclonable identity solution is generated from within the PUF SRAM chip. Note this can be e...

Next Article
Platform Is Perfectly Suited for Medical Applications
Platform Is Perfectly Suited for Medical Applications

Advances in computer-aided healthcare are coming at us at record-breaking speed. While that in itself can b...