As the number of networked devices continues to expand, so does the attack surface presented by our systems. There is a lot of talk about needing to secure our devices against the growing number of attacks and exploits. But, what does this discussion really mean to an embedded Linux developer and what steps can we take to secure our devices? Issues of confidentiality, integrity, authentication, authorization, non-repudiation and our strategy for software updates all must be addressed at some level within our designs. In this session, we will discuss several techniques for improving the robustness of our platforms and hardening them against the myriad of bad actors lurking on the Internet.