Events

Home   /   Events   /   Driving Cybersecurity and Trusted Computing in Defense Systems

Driving Cybersecurity and Trusted Computing in Defense Systems

Embedded computing for military applications is vulnerable to cyberthreats like every other system. Threats are prevalent throughout every part of the system from the ICs to the signal-board computer to the software. Trust needs to be assured with each hardware component and software element. This webcast of military embedded computing experts will discuss how to proactively prevent, detect, and stop threats via cybersecurity, anti-tamper methods, better encryption, secure networking, traceability, and more.

April 2024
MTWTFSS
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
1
2
3
4
5

About the Provider

Military Embedded Systems
The Military Embedded Systems publications are the most complete resources for developers and integrators of embedded military systems. The Resource Guide, website, and the limited production magazine (this year mailed to 35,000 engineers, managers, decision makers, US DOD personnel, and other industry professionals) can be used as year-round resources for engineers, companies, and decision makers looking for embedded products ranging from software, development tools, hardware, systems, commercial off-the-shelf (COTS), technology insertion, end of life mitigation, and myriad other military-specific technical subjects.

TOPICS

Cybersecurity, Cyberthreats, Military