Showing 121 - 128 of 158
Milsat Magazine

The New Warfighting Domain — A Solution to Tackle Cybersecurity in Tactical Communications

Cyber has emerged as a new warfighting domain.

05/17/2018
Military & Aerospace Electronics

Trusted Computing Hardware Features for Maintaining Cyber Security During Operation

We look at the hardware features built-in to the most popular defense and aerospace processor architectures to ensure the continued cyber security of a trusted computing system.

04/25/2018
Military & Aerospace Electronics

Trusted Boot: A Key Strategy for Ensuring the Trustworthiness of an Embedded Computing System

Steve Edwards looks at how Trusted Boot is a key strategy for ensuring the trustworthiness of an embedded computing system against cyber attacks.

04/25/2018
Fifth Domain Cyber by C4ISRNET

4 Ways to Deliver Tactical Cyber to the Battlefield

The U.S. Army is increasingly examining the use of battlefield cyber techniques. Read the article on how to deliver tactical cyber to the battlefield.

04/03/2018
Curtiss-Wright Debuts Industry’s First 8th Gen Intel Xeon-based 3U OpenVPX SBC

Curtiss-Wright Debuts Industry’s First 8th Gen Intel Xeon-based 3U OpenVPX SBC

Curtiss-Wright Debuts Industry’s First 8th Gen Intel Xeon-based 3U OpenVPX Single Board Computer.

04/03/2018
Curtiss-Wright’s New Format Converter Eases Integration of New and Legacy Video Equipment on Aerospace and Defense Platforms

Curtiss-Wright’s New Format Converter Eases Integration of New and Legacy Video Equipment on Aerospace and Defense Platforms

Small, lightweight COTS-Based Rugged Video Gateway Format Converter (RVG-FC1) supports 15 different video formats and resolutions

02/26/2018
Military & Aerospace Electronics

COTS-Based Trusted Computing: Getting Started in Next-Generation Mission-Critical Electronics

Trusted computing involves technologies protect mission-critical embedded electronics from physical and remote attacks and from hardware and software failures.

02/21/2018
trusted computing security

Trusted Computing: A Layered Approach to Security

Aaron Frank looks at how security must be implemented at every layer of each solution to create a system that can be fully trusted.

01/30/2018