Those familiar with CPU Tech know that the company does not publicly discuss the specific techniques and technologies used in the Secure Processor or the Secure Design Environment. However, today Military Embedded Systems published an article submitted by CPU Tech discussing a very specific set of technologies that can be used for silicon security, and some conclusions about how the technology should be used.
Just last week, the National Institute of Standards (NIST) published the first draft of a new guidance on Supply Chain Security for Federal Information Systems. This publication is titled NISTIR 7622: Piloting Supply Chain Risk Management for Federal Information Systems.
In front of a group of ‘Business Executives for National Security’, Secretary of Defense Robert Gates proposed an overhaul of the US Export Control system currently in place. The reason: as formatted, it doesn’t do much to protect either national security or our technical intellectual property. (Article as reported by www.defense.gov)
“The United States is thought to have one of the most stringent export regimes in the world, but stringent is not the same as effective,” Gates said.
A joint press release went out today from CPU Tech and Green Hills Software, announcing the availability of the GHS INTEGRITY RTOS for the Acalis secure processor.
At the beginning of February, the NIST released a draft of the Smart Grid Security Strategy and Requirements document in development. This product is aimed at defining the approach and trade-offs between flexibility, energy efficiency, and security in modern electrical grids. This is a high level committee approach and collaboration between the Department of Energy (DOE), the Department of Homeland Security (DHS), the Federal Energy Regulatory Commission (FERC), and the National Institute of Standards (NIST). Authorship and participation has included Government and Industry. Continue reading
While hundreds of other blogs publish their take on the pending announcement of Howard Schmidt to the post of White House Cyber Security Coordinator, I would like to make a brief comment on where our efforts are currently being spent on the Acalis secure processor in the overarching effort to make internet activities more secure.
Ever since the Center for Strategic and International Studies published their recommendations for Securing Cyberspace for the 44th Presidency (which was itself preceeded by a great amount of analysis and study), the press has been awaiting the designation of a ‘Cyber Security Czar’ by the Obama administration. The long wait for an appointee and the escalating drama of this position, and whether it has the right amount of administrative and directive power to fulfill its mission, has had a chilling impact on an industry struggling to come up with products and processes to meet our national security needs. Continue reading
Defense contractors have been depending on the export market in order to weather the current economic crisis. It turns out their hopes have considerable justification. According to a September 9, 2009 NY Times article,
“The United States signed weapons agreements valued at $37.8 billion in 2008, or 68.4 percent of all business in the global arms bazaar, up significantly from American sales of $25.4 billion the year before.”
By contrast, through the early 2000s, arms sales averaged only $8-13B. According to Loren Thomsen of the Lexington Institute, “weapons could be the single biggest export item over the next ten years.” Continue reading