Showing 1 - 12 of 71
Webinar: Today's Tactical Command Posts: Rapid Setup for Resilient and Secure Communications on the Move

Webinar: Today's Tactical Command Posts: Rapid Setup for Resilient and Secure Communications on the Move

Dominic Perez, Chief Technology Officer at Curtiss-Wright Defense Solutions and Ken Rich, US Federal Chief Technology Officer at HPE Aruba, explore the evolution and modernization of military command posts.

05/31/2024
Meeting DAL A Challenges with Dissimilar Redundant Architecture

Meeting DAL A Challenges with Dissimilar Redundant Architecture

This white paper examines how building a system with a dissimilar redundant architecture can help overcome the challenges of meeting DO-254/178 DAL A requirements.

05/22/2024
Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption

Securing Data with Quantum Resistant Algorithms: An Introduction to Post-Quantum Resistant Encryption

The goal of post-quantum cryptography (PQC), also called quantum-resistant cryptography (QRC), is to develop cryptographic systems that are secure against both quantum and classical computers and can interoperate with existing communications protocols and networks.

05/22/2024
Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions

Securing Data with Quantum Resistant Algorithms: Implementing Data-at-Rest and Data-in-Transit Encryption Solutions

In this second paper, we cover challenges for deploying QR encryption, including pre-shared key (PSK) management, RFC 8784 - an extension of Internet Key Exchange (IKE) v2 that allows it to be resistant to a quantum computer by using PSKs, and how to implement data-at-rest (DAR) and data-in-transit (DIT) QR encryption solutions today using commercial FPGA devices and off-the-shelf hardware.

05/22/2024
Navigating the Unseen: Mitigating Degraded Visual Environments

Navigating the Unseen: Mitigating Degraded Visual Environments

Using a Degraded Visual Environment (DVE) system enables aircraft pilots to visualize the landing area in poor conditions, allowing them a safe, on-time descent to their target destination.

05/01/2024
Webinar: Compute at the Edge: Selecting CPUs, GPUs, FPGAs for SWaP-Constrained and Rugged Applications

Webinar: Compute at the Edge: Selecting CPUs, GPUs, FPGAs for SWaP-Constrained and Rugged Applications

Dominic Perez, Chief Technology Officer, Curtiss-Wright Defense Solutions, and Aaron Frank, Senior Product Manager, Curtiss-Wright Defense Solutions, talk about critical considerations for selecting CPUs, GPUs and FPGAs for rugged field applications and vehicle platforms with size, weight and power constraints.

04/12/2024
DAR Series Part 3: NSA Type 1 Encryption

DAR Series Part 3: NSA Type 1 Encryption

A Type 1 product is a classified or Controlled Cryptographic Item (CCI) endorsed by the NSA for securing classified and sensitive U.S. government information.

04/02/2024
Certifying Multi-Core Processing Following AMC 20-193/AC 20-193 Objectives

Certifying Multi-Core Processing Following AMC 20-193/AC 20-193 Objectives

This white paper examines the key challenges multi-core processors present in safety-certifiable systems, and the traditional and newer, more effective techniques for alleviating them to ensure MCP-based systems will safely perform their intended functions.

04/01/2024
DAR Series Part 2: Commercial Solutions for Classified (CSfC)

DAR Series Part 2: Commercial Solutions for Classified (CSfC)

Learn about the NSA CSfC program, data at rest encryption, capability package, protection profiles, components & layers, and trusted integrators.

03/13/2024
Webinar: Delivering Cloud Capabilities to the Tactical Edge

Webinar: Delivering Cloud Capabilities to the Tactical Edge

Dominic Perez, Chief Technology Officer, Curtiss-Wright Defense Solutions and Brandon Gulla, Vice-President and Chief Technology Officer, Rancher Government Solutions, talk about how to take advantage of containerized and virtualized application infrastructure when moving out of the data center and into the combat scenarios.

01/10/2024
DAR Series Part 1: Data Threats and Protection

DAR Series Part 1: Data Threats and Protection

Classified data-at-rest (DAR) faces both internal and external threats that can subject sensitive data to exploitation.

01/04/2024
Plug-in-Card Security and the SOSA Technical Standard

Webinar: Plug-in-Card Security and the SOSA Technical Standard

Steve Edwards, Director of Secure Embedded Solutions at Curtiss-Wright Defense Solutions, talks about plug-in card security and the SOSA technical standard.

12/20/2023