Showing 1 - 8 of 38
Curtiss-Wright Completes Common Criteria Cryptographic / Cybersecurity Testing for PacStar 400-Series Servers with Cisco ASAv 9.12

Curtiss-Wright Completes Common Criteria Cryptographic/Cybersecurity Testing for PacStar 400-Series Servers with Cisco ASAv 9.12

Certification of new version of Cisco’s traffic filtering firewall and VPN gateway software for Pacstar 451/453/455 further extends PacStar leadership in Tactical Networking and Classified Wireless.

08/24/2021
Military vehicle video system

7 Ways Single-Vendor Video Systems Reduce Risks and Costs

Choosing a single vendor for a complete video management system massively reduces program risks and costs.

03/11/2021
F-17 Modular Open System Approach

How Modularity Can Shorten System Development and Decrease Costs

Learn how modular systems can help meet cost, schedule, quality, and technical requirements, while reducing risk and eliminating traditional NRE fees.

02/02/2021
Wind River and Curtiss-Wright Collaborate on Cybersecurity Protections for Defense Systems

Wind River and Curtiss-Wright Collaborate on Cybersecurity Protections for Defense Systems

Wind River Titanium Security Suite integrated, tested, and validated on Curtiss-Wright OpenVPX™ module portfolio.

01/05/2021
Avionics International

Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Connected Aircraft Systems?

Aviation cybersecurity mandates by the European Union Aviation Safety Agency (EASA) and the Federal Aviation Administration (FAA) are coming in the next two years.

04/09/2020
Military & Aerospace Electronics

Designers of Small Rugged Computers for the Battlefield Balance Size, Performance, and Cooling

Commercial off-the-shelf (COTS) components are being embraced so the technology can be serviced at the base instead of waiting for specialized parts or sending the system back state-side.

02/03/2020
Military & Aerospace Electronics

Military Cyber Security: Threats and Solutions

U.S. government and military are taking a lead role in protecting sensitive computers from cyber attack, and solutions finally are on the horizon.

12/18/2019
Military & Aerospace Electronics

Trusted Computing: An Overview

Attacks are getting sophisticated. Examples include Rowhammer, Meltdown, Spectre, and others. System designers need to consider many attack vectors.

12/18/2019