Video 5: Hardening and fortifying

Logo
Presented by

Wind River

About this talk

You must anticipate a breach will happen . Model different threat scenarios and put in place mechanism to protect your applications, data, IP, and the resiliency of the device. Your threat model should assume that an attacker will get root (admin) access.
Related topics:

More from this channel

Upcoming talks (0)
On-demand talks (11)
Subscribers (4107)
Wind River is a global leader in delivering software for mission-critical intelligent systems. Wind River is accelerating digital transformation across industries by delivering the software and expertise that enable the development, deployment, operations, and servicing of mission-critical intelligent systems from the edge to the cloud. Wind River technology is found in billions of products and is backed by world-class services and support and a broad partner ecosystem.