Showing 17 - 24 of 85
Curtiss-Wright Flight Test Equipment Utilized During NASA's Space Launch System (SLS) Core Stage Test

Curtiss-Wright Flight Test Equipment Utilized During NASA's Space Launch System (SLS) Core Stage Test

Curtiss-Wright data acquisition units support SLS test data collection goal

04/06/2021
Military & Aerospace Electronics

Challenges of Risk Management Framework for Cyber Security and Trusted Computing in Embedded Computing

The RMF establishes security and privacy controls, and contains more than 800 controls to select from, many of which don't apply to embedded systems.

01/27/2021
Military & Aerospace Electronics

The Essentials of Trusted Computing and Cyber Security

U.S. military and government information security experts try to hold the line against determined hackers seeking to break into critical computing systems from foreign governments and non-state bad actors.

01/06/2021
Military & Aerospace Electronics

Speed and Security for Military Data Storage

Rugged data storage systems for aerospace and defense applications are moving to new data interfaces for unparalleled speed and capacity, while trusted computing and information security are driving trends.

01/06/2021
Wind River and Curtiss-Wright Collaborate on Cybersecurity Protections for Defense Systems

Wind River and Curtiss-Wright Collaborate on Cybersecurity Protections for Defense Systems

Wind River Titanium Security Suite integrated, tested, and validated on Curtiss-Wright OpenVPX™ module portfolio.

01/05/2021
Military & Aerospace Electronics

Cyber Security Robustness of an Embedded Computing System with Trusted Computing Measures Built-in

Cyber Security Robustness of an Embedded Computing System with Trusted Computing Measures Built-in

12/16/2020
Data-at-rest encryption

Planning to Export Data-at-Rest Storage with Encryption?

If you are developing a deployed vehicle, then you’re likely considering including a device to securely store classified, or at least sensitive, data.

11/12/2020
Military Embedded Systems

Creating a Trusted Platform for Embedded Security-critical Applications

Security-critical applications, such as cross-domain solutions (CDS), require a secure, trusted platform on which to execute, spanning software, firmware, and hardware. The lowest layer that the application interacts with directly is a trusted operating system (OS).

10/08/2020