Showing 1 - 8 of 8
Military Embedded Systems

Securing Telemetry Data with Commercial Encryption Standards Article from Military Embedded Systems

Telemetry data from military flight tests often needs to be secured, not only when at rest, but also while in motion across a network or a telemetry link.

12/01/2021
Military & Aerospace Electronics

Challenges of Risk Management Framework for Cyber Security and Trusted Computing in Embedded Computing

The RMF establishes security and privacy controls, and contains more than 800 controls to select from, many of which don't apply to embedded systems.

01/27/2021
Military Embedded Systems

Keeping Up To Date With CSfC Capability Packages

Since its introduction in 2014, the National Security Agency Commercial Solutions for Classified (CSfC) program has proven very effective in lowering the cost and speeding the accessibility of encryption for critical data-at-rest (DAR).

09/09/2020
Military Embedded Systems

Today’s Military Data Storage Goes Far Beyond Rugged

It’s not just about shielding data drives from shock and vibration; designers also are looking for the latest in speed and capacity, and want encryption to protect data at rest, and security to foil tampering.

12/18/2019
article

Protecting Top-Secret Data with NSA-Approved COTS Encryption

Paul Davis looks at the Commercial Solutions for Classified (CSfC) Program, the CSfC approval process and the benefits of being on the CSfC component list.

03/20/2019
Military Embedded Systems

Getting Up to Speed on NSA-Approved Two-Layer Commercial Encryption

Paul Davis looks at how CSfC allows system designers to now deploy a commercial off-the-shelf (COTS) solution with encrypted data protection for Type 1 products reducing time and cost.

11/15/2017
Military Embedded Systems

The Advantages of Netbooting for Embedded Systems

Paul Davis looks at how netbooting provides a superior alternative solution for installing and updating software that delivers huge labor savings.

09/01/2017
Military Embedded Systems

NSA-Approved Two-Layer Encryption Approach Slashes Cost and Development Time

Paul Davis from Curtiss-Wright looks at the NSA-approved two-layer encryption approach which slashes cost and development time.

09/02/2016