Showing 1 - 8 of 53
Trusted Computing for National Defense

Trusted Computing for National Defense

Computer experts are deepening their defenses against cyber attack and information security breaches.

12/02/2023
Leveraging High-Speed NVMe Storage for CSfC Encrypted Data-at-Rest

Leveraging High-Speed NVMe Storage for CSfC Encrypted Data-at-Rest

One way to take optimal advantage of the increased performance of the NVMe storage devices is to use an NVMe-based in-line hardware encryptor.

11/21/2023
Trusted Computing for National Defense

Trusted Computing for National Defense

Cyber security enters the realm of zero trust, as military forces seek to safeguard sensitive military technologies from enemy cyber hackers and spoofers.

12/21/2022
Military Embedded Systems Magazine

Sensor Open Systems Architecture (SOSA), Unmanned Vehicles, and Trusted Computing

System integrators need to ensure that the sensor systems and the critical data they collect and store are protected from falling into the wrong hands.

08/16/2022
Military Embedded Systems Magazine

Ruggedization, Space Constraints an Ongoing Challenge for Military Data-at-rest

Trying to strike a balance between power and security with data-at-rest in the field – and doing it all within a highly constrained space in an environment with dirt and moisture that threatens to damage expensive equipment – is a tall order indeed.

07/22/2022
Military Embedded Systems

Sensor Open Systems Architecture (SOSA), Unmanned Vehicles, and Trusted Computing

Today, with the increasing use of unmanned platforms to host intelligence, surveillance, and reconnaissance [ISR] sensor applications, system integrators need to ensure that the sensor systems and the critical data they collect and store are protected from falling into the wrong hands.

03/08/2022
Military & Aerospace Electronics

Cyber Battlegrounds: Trusted Computing, Cyber Warfare, and Cyber Security for National Defense

The threat categories are many. Vehicle loss or capture, data loss or transport, nation state hackers or internal threats all can threaten or intercept data at rest.

01/10/2022
Military Embedded Systems

Enterprise Cyberdefenses Needed to Defend Embedded Networks

The U.S. Army, Air Force, Navy, Marine Corps, and Space Force are actively looking to new programs such as Joint All Domain Command and Control (JADC2) to ensure warfighters have maximum situational awareness.

08/09/2021