Showing 9 - 16 of 108
Trusted Computing for National Defense

Trusted Computing for National Defense

Cyber security enters the realm of zero trust, as military forces seek to safeguard sensitive military technologies from enemy cyber hackers and spoofers.

12/21/2022
Secure Mesh Wireless Networks Drive Command Post Mobility

Secure Mesh Wireless Networks Drive Command Post Mobility

For years, the goal of our armed forces has been mobility at the command post, with Army leaders setting the standard to be able to move hourly, with the command post’s network ready, powered up and receiving in five minutes.

11/30/2022
Curtiss-Wright Selected to Provide MOSA-based Encrypted Data Storage Solution for Small-Class Unmanned Underwater Vehicle

Curtiss-Wright Selected to Provide MOSA-based Encrypted Data Storage Solution for Small-Class Unmanned Underwater Vehicle

Curtiss-Wright's DTS1 device has been selected by a leading U.S. system integrator for use on a Small-Class Unmanned Underwater Vehicle (UUV) deployment.

10/25/2022
Military Embedded Systems Magazine

Ruggedization, Space Constraints an Ongoing Challenge for Military Data-at-rest

Trying to strike a balance between power and security with data-at-rest in the field – and doing it all within a highly constrained space in an environment with dirt and moisture that threatens to damage expensive equipment – is a tall order indeed.

07/22/2022
Curtiss-Wright Defense Solutions leadership to present opening remarks at CSfC 2022.

Curtiss-Wright to Showcase Secure Tactical Warfighter Communications Solutions for Data-at-Rest/Data-in-Transit at Commercial Solutions for Classified Conference

Curtiss-Wright Defense Solutions leadership to present opening remarks at CSfC 2022.

05/10/2022
Network attached storage UAV

Video Recording, Storage, and Encryption

High-definition video streams can now be captured by a rugged Network Attached Storage that is also being used as a standard file server.

04/27/2022
Milsat Magazine

Secure Wireless Solutions for Tactical, Expeditionary, + Deployable Communications

U.S. Department of Defense (DoD) tactical/expeditionary networking and command post programs have widely acknowledged the critical need to improve mobility.

03/23/2022
Edge Computing

Edge Computing, Encryption, and DAR

Paul Davis takes a look at Edge Computing and approved encryption methods for Data at Rest on Network Attached Storage.

01/31/2022