Showing 1 - 12 of 479
Cyber Range at the Edge: Building a Digital Twin of your network to Improve Mission Readiness

Webinar: Cyber Range at the Edge: Building a Digital Twin of your network to Improve Mission Readiness

Mark Luther and Charles Reynolds talk about how organizations are staying ready, learning new technologies and reducing downtime by implementing Cyber Range as a Service, how you can spin up realistic network training environments, how to pit red teams against blue teams and how to simulate cyber hunt in a fraction of the time, costs and traditional approach.

01/17/2025
Implementing RAID Configurations for Deployed Network Attached Storage Systems

Implementing RAID Configurations for Deployed Network Attached Storage Systems

Network attached storage (NAS) systems for mission-critical applications require high data integrity and system performance. As the backbone for storing and accessing critical data, NAS devices must include functionality that minimizes the risks associated with data loss due to hardware disk failures.

01/14/2025
Unmanned Surface Vehicle Requires Encrypted Storage for the Autonomy System

Securing Data-at-Rest in an Unmanned Surface Vehicle

A shipbuilder developing a new Unmanned Surface Vehicle (USV) faced strict requirements for securely handling classified data.

01/13/2025
Webinar: Reducing Risk via a COTS-based Safety-Certifiable Avionics Platform

Webinar: Reducing Risk via a COTS-based Safety-Certifiable Avionics Platform

This webinar is on reducing risk via a cost-based certifiable avionics platform.

01/10/2025
Single Board Computer Requires Additional Storage

Expanding Onboard Storage: Enhancing SBC Performance with Advanced XMC Solutions

A customer required additional persistent memory to collect sensor data. During the mission, that data would be processed, analyzed, and displayed for the aircrew. Learn about the solution.

01/09/2025
Power over Ethernet in Military Environments

Power over Ethernet in Military Environments

Using the same cable for both power and data means that power can be delivered to devices without having to wire new circuits or requiring a separate transformer that converts AC power to DC.

12/13/2024
History and Future of Flight Recorder Regulations

History and Future of Flight Recorder Regulations

This white paper looks at the history of flight recorders, their regulations, how these regulations are formulated, and what the future may bring.

12/10/2024
Data Protection with the NXP QorIQ Platform Trust Architecture

Data Protection with the NXP QorIQ Platform Trust Architecture

This white paper presents an overview of the potential threats to an embedded system, and how the Trust Architecture can effectively defend against these threats.

12/03/2024
The SOSA Technical Standard and Trusted Computing for Defense Systems

The SOSA Technical Standard and Trusted Computing for Defense Systems

The SOSA Technical Standard combines MOSA principles with security to enable secure sensor processing systems to be quickly developed and deployed in a low-risk environment.

11/29/2024
Establishing a Trusted Supply Chain

Establishing a Trusted Supply Chain

This paper examines the best practices commercial off-the-shelf (COTS) hardware vendors must employ to establish a trusted supply chain, including managing obsolescence, counterfeit parts mitigation, secure manufacturing, and design integrity.

11/28/2024
Protect and Isolate NAS Functions with Software Full Disk Encryption and Disk Partitioning

Protect and Isolate NAS Functions with Software Full Disk Encryption and Disk Partitioning

Through disk partitioning and commercial off-the-shelf (COTS) data-at-rest (DAR) encryption, this paper proposes a solution that reduces the risk of data loss, corruption, and accessibility if intercepted.

11/21/2024
New50-DARencryptionGuideUAV.png

Data-at-Rest Encryption Guide

Cost-effective, proven, and certified COTS storage solutions that match various data security requirements, including NSA Type 1, NSA CSfC, CC, NIAPC and FIPS 140-2.

11/19/2024