Showing 105 - 112 of 135
Military & Aerospace Electronics

Trusted Computing Hardware Features for Maintaining Cyber Security During Operation

We look at the hardware features built-in to the most popular defense and aerospace processor architectures to ensure the continued cyber security of a trusted computing system.

04/25/2018
Military & Aerospace Electronics

Trusted Boot: A Key Strategy for Ensuring the Trustworthiness of an Embedded Computing System

Steve Edwards looks at how Trusted Boot is a key strategy for ensuring the trustworthiness of an embedded computing system against cyber attacks.

04/25/2018
Green Hills Software, and Harris Corporation Demonstrate Two FACE-Conformant Digital Moving Map Solutions for Defense Avionics

Curtiss-Wright, Green Hills Software, and Harris Corporation Demonstrate Two FACE-Conformant Digital Moving Map Solutions for Defense Avionics

Green Hills Software, and Harris Corporation Demonstrate Two FACE-Conformant Digital Moving Map Solutions for Defense Avionics

04/18/2018
Fifth Domain Cyber by C4ISRNET

4 Ways to Deliver Tactical Cyber to the Battlefield

The U.S. Army is increasingly examining the use of battlefield cyber techniques. Read the article on how to deliver tactical cyber to the battlefield.

04/03/2018
Curtiss-Wright Debuts Industry’s First 8th Gen Intel Xeon-based 3U OpenVPX SBC

Curtiss-Wright Debuts Industry’s First 8th Gen Intel Xeon-based 3U OpenVPX SBC

Curtiss-Wright Debuts Industry’s First 8th Gen Intel Xeon-based 3U OpenVPX Single Board Computer.

04/03/2018
Military & Aerospace Electronics

COTS-Based Trusted Computing: Getting Started in Next-Generation Mission-Critical Electronics

Trusted computing involves technologies protect mission-critical embedded electronics from physical and remote attacks and from hardware and software failures.

02/21/2018
MilsatMagazine

A PacStar/PKI Perspective - Best Public Key Infrastructure Practices for Tactical Networks

Recent advances in mobile devices increase the DoD’s reliance on secure wireless networking.

02/16/2018
trusted computing security

Trusted Computing: A Layered Approach to Security

Aaron Frank looks at how security must be implemented at every layer of each solution to create a system that can be fully trusted.

01/30/2018