Learn about security for open source.

Using Graph Analytics and Machine Learning to Continuously Monitor Embedded Code for Critical Vulnerabilities

This technical article from "Embedded Computing Design" describes the challenge of managing open source vulnerabilities in IoT systems — and how Lexumo's automated service simplifies vulnerability management.

Ensuring Continuous Code Security for IoT & Embedded Devices

Learn how ‘Big Code” analytics is transforming the way software developers secure open source libraries in their embedded code.

5 Best Practices for Securing Embedded Linux

Vulnerable Linux devices have already been compromised on a wide scale by cybercriminals. Learn how to assess and harden your embedded software with these top 5 tips.