Click here to view this message in a browser window.

Timesys embedded software development and security newsletter September 2021

Embedded Systems
A Timesys Deep Dive

April 2022


Cybersecurity in the news

The 11 CVEs You Need to Know About

Have you heard about this BusyBox flaw, these Azure Defender critical hijacking bugs, or this damaging heap buffer overflow flaw? With an average of 50 new CVEs every day, how do you cut through the noise and take action on the vulnerabilities that pose the largest threat to your device?

We've launched the Timesys CVE Dashboard, updated weekly with details on the dangerous security vulnerabilities that could be affecting your device.

Take me to the CVE Dashboard

Meet VigiShield Secure by Design

Security, simplified.

Security is a complex, time-consuming, ever-evolving process that requires deep expertise across many disciplines. With VigiShield Secure by Design, we've distilled the security feature implementation process down into an easy-to-understand, PSA certified, maintainable Yocto security layer that can be configured to meet your current customer and regulatory (e.g. NISTIR 8259A and ETSI EN 303) requirements. 

VigiShield leverages widely used open source technologies, enables underlying hardware capabilities for best performance, and implements the security best practices recommended by regulatory and industry-specific bodies (FDA, IEC, etc).

With security built-in using VigiShield, device manufacturers can focus more on innovation during the product development process and get to market faster.

Learn More About VigiShield
Schedule a VigiShield Consultation



The results are in!

Get your copy of the 2022 Timesys Cybersecurity Survey results! Featuring insights from more than 100 industry professionals, this infographic presents key learnings on the state of the industry for cybersecurity.

Download Cybersecurity Survey Results

Learn with Timesys

Read up on embedded security with our two latest blogs

DM-Verity Without an Initramfs

Learn how you can implement file system verification on your embedded system without the use of an initramfs. This can significantly save boot time and storage requirements in many situations.

Read the blog



Securing U-Boot: A Guide to Mitigating Common Attack Vectors

Learn about ways in which you can protect and secure U-Boot implementations on your embedded systems. This involves signed FIT images, environment protections, and serial console disablement methods.

Read the blog

Upcoming Events

Conferences Around the World You Don't Want to Miss


Embedded Online Conference

A conference for embedded systems engineers

April 25-29, online

So much learning to do, and so little time. Don't worry if you're joining late -- many talks are available on-demand. 

Be sure to stop by the "demo" area to see our new Embedded Board Farm video!

Learn More | Register




Cybersecurity industry event

May 4, Pittsburgh, PA

Join us in our hometown for the 7th annual Cyburgh, a forum for cybersecurity, IT, and business professionals to engage with and learn from peers, thought leaders, and solution providers.

Our very own Al Feczko will present a tech talk on software supply chain security.

Check out Cyburgh


2nd European Medical Device & Diagnostic Cybersecurity + Software Development & Compliance 

Joint live conference

May 17-18, Brussels

We are thrilled to be sponsoring this year's event, and our very own Maciej Halasz will be presenting on securing the open source embedded software supply chain for medical devices. 

Learn More


Embedded Technology Convention USA 2022

Embedded Technologies & Systems Showcase

June 8-9, Las Vegas, NV

Join us at the Embedded Tech Convention with 5000 of our closest friends! Discover the latest technological innovations and trends, expand your industry knowledge and extend your global professional network.

Register To Attend


Embedded World 2022

Exhibition & Conference

June 21-23, Nuremberg

Will you be at Embedded World this year? We're excited to showcase our latest security solutions as a featured partner with our friends at STMicroelectronics. 

More Details


Security Vulnerability Management 101

Tool & Techniques to Monitor and Remediate Vulnerabilities in Your SBOM

May 26 @ 12 PM ET / 9 AM PT

In this monthly live webinar and Q&A session, you'll learn:

- Why you need to manage your open-source software risks 
- How to generate an accurate SBOM (Software Bills of Materials) and why it matters
- Tools and techniques to monitor and remediate vulnerabilities in your SBOM
- And much more!

Yes! I want to register for the live webinar and Q&A

Can't make it on May 26th? Reply to this email and we'll send you the event recording, or watch previous webinars here.

Timesys blog logo YouTube logo Linkedin logo Twitter logo  Facebook logo

Timesys, the Timesys logo, and Vigiles are trademarks or registered trademarks of Timesys Corporation. Linux is a registered trademark of Linus Torvalds in the United States and other countries. All other company and product names mentioned are trademarks and/or registered trademarks of their respective owners.

Copyright ©2022 Timesys Corporation
Our address is 1905 Blvd of the Allies, Pittsburgh, PA 15219, USA

If you do not wish to receive future Timesys Corporation email communications or would like to manage your communication preferences, click here.