Showing 13 - 24 of 93
Military & Aerospace Electronics

The Essentials of Trusted Computing and Cyber Security

U.S. military and government information security experts try to hold the line against determined hackers seeking to break into critical computing systems from foreign governments and non-state bad actors.

Military & Aerospace Electronics

Speed and Security for Military Data Storage

Rugged data storage systems for aerospace and defense applications are moving to new data interfaces for unparalleled speed and capacity, while trusted computing and information security are driving trends.

Military & Aerospace Electronics

Cyber Security Robustness of an Embedded Computing System with Trusted Computing Measures Built-in

Cyber Security Robustness of an Embedded Computing System with Trusted Computing Measures Built-in


The Case for Distributed and Remote Management of Open Standards-Based Tactical Networks for Vehicles

To exploit the potential benefits of new technologies such as artificial intelligence (AI), robotics, video analysis, Internet of Things (IoT), augmented reality and virtual reality, and other innovative technologies on mobile platforms at the tactical edge, Department of Defense (DoD) communications programs must effectively deploy advanced IT infrastructure, connectivity, and compute resources.


Planning to Export Data-at-Rest Storage with Encryption?

In applications where data flows need to take place in nanoseconds, the delay between when an instruction is received and when it executes, known as latency, is very important.

Military Embedded Systems

Creating a Trusted Platform for Embedded Security-critical Applications

Security-critical applications, such as cross-domain solutions (CDS), require a secure, trusted platform on which to execute, spanning software, firmware, and hardware. The lowest layer that the application interacts with directly is a trusted operating system (OS).


White Paper Series: Data-At-Rest Encryption

The Data-At-Rest Encryption Series white papers provide engineers, system architects, and program managers with background information, technical details, and a methodology for selecting a data-at-rest (DAR) security approach.


White Paper Series: Trusted Computing for Aerospace and Defense

Looking for the latest on Trusted Computing for aerospace and defense? Our white paper series, Trusted Computing: The COTS Perspective, examines the technologies and trends protecting today’s critical systems from cybersecurity and physical threats.

Military & Aerospace Electronics

New Frontiers in Real-Time Software

Efficient execution is key to real-time mission-critical operating systems software, yet new demands are emerging such as safety-critical operations for avionics and other life-critical applications.

Military & Aerospace Electronics

Trusted Computing for Defense & Aerospace Article eBook

This collection of articles, originally published by Military & Aerospace Electronics, covers a variety of Trusted Computing topics such as trusted boot, cyber security, quantum computing, cryptography and more, with a specific focus on the defense and aerospace industries.

Avionics International

Will Today’s Cybersecurity Guidelines and Standards Become Mandates for Connected Aircraft Systems?

Aviation cybersecurity mandates by the European Union Aviation Safety Agency (EASA) and the Federal Aviation Administration (FAA) are coming in the next two years.

Avionics International

Industry Responds to New Security Regulations, Vulnerabilities Facing Embedded Suppliers

All aviation stakeholders now must comply with the emerging aviation cybersecurity standards known as “Airworthiness Security Process Specification,” identified and first introduced as DO-326A in the US and ED-202A in Europe.