97% of risk management professionals said they believed unsecured IoT devices could be open to a “catastrophic” security breach (Ponemon Institute, 2018).
Traditional embedded OSes have limited protections between processes and application/system dependencies. A large attack surface enables a single exploit to compromise the integrity of the entire system. Learn how to implement Linux securely on an embedded system.
What you will learn:
- How to harden your embedded operating system
- How to reduce the attack surface by removing code and interfaces that are not absolutely required
- How to leverage defense in depth on your embedded device