Showing 1 - 8 of 53
Trusted Computing for National Defense

Trusted Computing for National Defense

Computer experts are deepening their defenses against cyber attack and information security breaches.

12/02/2023
Avionics International

Open or Out: U.S. Military Requirements for Modular Open Systems Architectures

Now that the Army has chosen its preferred Future Long Range Assault Aircraft in Bell’s V-280 advanced tiltrotor, the race is on to populate it with mission systems that will allow the machine to operate through adversaries’ sophisticated air defense systems.

03/21/2023
Understanding GCIA

Understanding GCIA: A Paradigm Shift for Establishing an Overall Ground-combat Vehicle Architecture

The U.S. Army has long pursued a standardized infrastructure and architecture for ground-combat vehicle hardware and networking.

02/16/2023
Trusted Computing for National Defense

Trusted Computing for National Defense

Cyber security enters the realm of zero trust, as military forces seek to safeguard sensitive military technologies from enemy cyber hackers and spoofers.

12/21/2022
Military Embedded Systems Magazine

Sensor Open Systems Architecture (SOSA), Unmanned Vehicles, and Trusted Computing

System integrators need to ensure that the sensor systems and the critical data they collect and store are protected from falling into the wrong hands.

08/16/2022
Military Embedded Systems

Sensor Open Systems Architecture (SOSA), Unmanned Vehicles, and Trusted Computing

Today, with the increasing use of unmanned platforms to host intelligence, surveillance, and reconnaissance [ISR] sensor applications, system integrators need to ensure that the sensor systems and the critical data they collect and store are protected from falling into the wrong hands.

03/08/2022
military embedded systems

SAVE this Space: Defining the C5ISR Space for Army Vehicles

To lower the cost and help speed the pace of technology upgrades for C5ISR [command, control, computers, communications, cyber, intelligence, surveillance, and reconnaissance] systems on Army vehicles, the U.S. Army’s Program Executive Officer (PEO) for Ground Combat Systems (GCS) has issued an Interface Description Document (IDD).

02/04/2022
Military & Aerospace Electronics

Cyber Battlegrounds: Trusted Computing, Cyber Warfare, and Cyber Security for National Defense

The threat categories are many. Vehicle loss or capture, data loss or transport, nation state hackers or internal threats all can threaten or intercept data at rest.

01/10/2022