Showing 1 - 12 of 35
Military & Aerospace Electronics

Cyber Battlegrounds: Trusted Computing, Cyber Warfare, and Cyber Security for National Defense

The threat categories are many. Vehicle loss or capture, data loss or transport, nation state hackers or internal threats all can threaten or intercept data at rest.

01/10/2022
Military & Aerospace Electronics

Challenges of Risk Management Framework for Cyber Security and Trusted Computing in Embedded Computing

The RMF establishes security and privacy controls, and contains more than 800 controls to select from, many of which don't apply to embedded systems.

01/27/2021
Military & Aerospace Electronics

The Essentials of Trusted Computing and Cyber Security

U.S. military and government information security experts try to hold the line against determined hackers seeking to break into critical computing systems from foreign governments and non-state bad actors.

01/06/2021
Military & Aerospace Electronics

Speed and Security for Military Data Storage

Rugged data storage systems for aerospace and defense applications are moving to new data interfaces for unparalleled speed and capacity, while trusted computing and information security are driving trends.

01/06/2021
Military & Aerospace Electronics

Cyber Security Robustness of an Embedded Computing System with Trusted Computing Measures Built-in

Cyber Security Robustness of an Embedded Computing System with Trusted Computing Measures Built-in

12/16/2020
Military Embedded Systems

Creating a Trusted Platform for Embedded Security-critical Applications

Security-critical applications, such as cross-domain solutions (CDS), require a secure, trusted platform on which to execute, spanning software, firmware, and hardware. The lowest layer that the application interacts with directly is a trusted operating system (OS).

10/08/2020
Military & Aerospace Electronics

Trusted Computing for Defense & Aerospace Article eBook

This collection of articles, originally published by Military & Aerospace Electronics, covers a variety of Trusted Computing topics such as trusted boot, cyber security, quantum computing, cryptography and more, with a specific focus on the defense and aerospace industries.

07/13/2020
Avionics International

Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Connected Aircraft Systems?

Aviation cybersecurity mandates by the European Union Aviation Safety Agency (EASA) and the Federal Aviation Administration (FAA) are coming in the next two years.

04/09/2020
Avionics International

Industry Responds to New Security Regulations, Vulnerabilities Facing Embedded Suppliers

All aviation stakeholders now must comply with the emerging aviation cybersecurity standards known as “Airworthiness Security Process Specification,” identified and first introduced as DO-326A in the US and ED-202A in Europe.

01/20/2020
Military & Aerospace Electronics

Military Cyber Security: Threats and Solutions

U.S. government and military are taking a lead role in protecting sensitive computers from cyber attack, and solutions finally are on the horizon.

12/18/2019
Military & Aerospace Electronics

Trusted Computing: An Overview

Attacks are getting sophisticated. Examples include Rowhammer, Meltdown, Spectre, and others. System designers need to consider many attack vectors.

12/18/2019
Military & Aerospace Electronics

The Different Trusted Computing and Cyber Security Approaches for Embedded Computing and Enterprise Systems

Embedded systems for deployment in the field can have vastly different needs for trusted computing and cyber security than those of enterprise systems.

11/21/2019