Showing 49 - 56 of 86
Military & Aerospace Electronics

A Guide to International Authorities for Global Trusted Computing Standards Certification

Trusted computing standards are evolving constantly within the United States, which can be confusing enough. International trusted computing standards can be even more difficult.

12/19/2018
Military & Aerospace Electronics

Military Organizes for Cyber Warfare

J.R. Wilson from Military & Aerospace looks closely at how U.S. warfighters work aggressively to protect computers and networks, just as they would do to protect territory, airspace, sea lanes, and access to space.

12/01/2018
Military & Aerospace Electronics

Introduction to Certification Authorities for Trusted Computing in Military and Avionics Products

In the world of security and trusted computing, there are many different disciplines involved. With a constantly evolving set of standards, learn what certifications might apply.

11/29/2018
cyber security defense

Recap: National Cyber Security Awareness Month 2018

In the defense industry, employing the proper protections to eliminate adversarial access or attacks is critical to mission safety and success.

11/01/2018
Curtiss-Wright Defense Solutions Sponsors the 2018 Intel Federal Summit

Curtiss-Wright Defense Solutions Sponsors the 2018 Intel Federal Summit

Curtiss-Wright Defense Solutions Sponsors the 2018 Intel Federal Summit

10/04/2018
 DO 254 miltary helicopter

Overcoming the DO-254 DAL A Challenge

DAL A DO-254 certification involves a strict set of guidance documents ensuring a high degree of safety in airborne electronics.

09/27/2018
Military & Aerospace Electronics

Decomposing System Security to Prevent Cyber Attacks in Trusted Computing Architectures

Trusted computing systems designers should consider system security early in the design process to prevent cyber attacks.

09/26/2018
Military & Aerospace Electronics

The Trusted Computing Implications of Interfaces, and How They Can Influence System Performance

Steve Edwards and David Sheets explore the implications of how interfaces influence system design in trusted computing.

08/22/2018