MAE Trusted
MAE Trusted   |   View online
 
MAE Trusted
 FEBRUARY 3, 2022
 
DATA BURSTS
 
 
 
 
 
 
THE BIG STORY
 
2112MA Esr P01
The threat categories are many. Vehicle loss or capture, data loss or transport, nation state hackers or internal threats all can threaten or intercept data at rest.
 
TRUSTED TECH TRENDS
 
Military computer networks are under persistent threat from hackers, so network security experts must be able to assess their cyber vulnerabilities.
 
Combat jets require rapid network switching and pointing, and must deal with diminished worst-case capacity imposed by anti-jam and low observability.
 
Threat actors have demonstrated the ability to breach network perimeter defenses, where they are free to move laterally over the network.
 
Researchers are focusing on technologies that support hardware and software for high-assurance, trusted, and secure computer architectures.
 
 
TRUSTED BUSINESS
 
BAE Rad Hard24Jan2022
 
Osprey16Nov2021
 
 
Cyber9Sept2021
 
Cyber Avionics26Aug2021
 
 
ADDITIONAL RESOURCES
 
Abaco18Jan2022
 
Digistor9Nov2021
 
 
Sysgo3Nov2021
 
Green Hills4Nov2021
 
 
 
© 2022 All rights reserved, Endeavor Business Media, LLC.
Facebook Twitter LinkedIn
 

This email is being sent to @{email name}@.

Please add news.militaryaerospace.com and mail.militaryaerospace.com to your address book or safe sender list to receive our emails in your inbox.

Unsubscribe | Manage Newsletter Subscriptions | Forward to a Friend | Customer Service Center | Read Privacy Policy

If this email was forwarded to you and you are interested in subscribing, please click here to sign-up.

If you have trouble with any of these methods, you can reach us toll-free at 800-547-7377.

Military & Aerospace Electronics
Endeavor Business Media
331 54th Avenue N.
Nashville, TN 37209