Latest Stories

Articles
Connectivity

Real-Time Processors Key to the Zonal E/E Revolution

OEMs face major challenges with their vehicle architectures as they become more complex and unwieldy. They also want to speed up their innovation cycles while supporting intelligent...

Feature Image

Articles
RF & Microwave Electronics

The Next Generation of Mission-Critical Communications Infrastructure is Here

The critical role of spectrum superiority in the success of battlefield campaigns is evidenced by the enormous investments being made in electronic warfare (EW)...

Feature Image

Briefs
Photonics/Optics

High-Speed Communication Vouchsafed by the Laws of Quantum Physics

Security in encrypted communication is a top priority because of our highly connected and mobile society’s increasing reliance on the internet. Engineers at Department of Electrical Engineering and Computer Science and the Research Laboratory of Electronics, MIT, have developed...

Technology Report
Connectivity

SAE and NREL Partner to Strengthen EV-Charging Cybersecurity

Members of the electric vehicle industry gathered at the National Renewable Energy Laboratory (NREL) in early April to evaluate enhanced cybersecurity for the connections...

Feature Image

Application Briefs
Data Acquisition

Security IP Module

Curtiss-Wright Defense Solutions Ashburn, VA
703-779-7800
www.curtisswright.com

Curtiss-Wright Defense Solutions, a leading proponent of modular open systems approach (MOSA) based solutions, announced that it...

Feature Image

News
Electronics & Computers

SAE WCX 2022: EV Cybersecurity Threats

With war in Europe, a waning pandemic and inflationary and supply pressures rampant, you’d think there was plenty to worry about. Those lucky enough to attend the 2022 SAE WCX panel...

Feature Image

News
Electronics & Computers

Survey Reveals Cyber, Quality Challenges of Vehicle Connectivity

Cybersecurity is viewed as the number one challenge to solve for next-generation vehicles, according to findings from a global survey of automotive industry insiders. The...

Feature Image

Articles
Internet of Things

Provisioning Smart Sensors for the IoT

The biggest challenge in the provisioning process: ensuring that a device and the connection to the network and server are secure.

Feature Image

Articles
Sensors/Data Acquisition

The Many Benefits of Smart IIoT Connected Factories

Automation can crumble, even when only one cog is loose, says Brad Walters from Monnit.

Feature Image

Application Briefs
Energy

Protecting the U.S. Electric Grid with Physics-Based Cybersecurity

The grid’s growing size and complexity increases vulnerability to cyberattacks.

Feature Image

Briefs
Connectivity

AI Technology Foils Cyberattacks

The technology is aimed at protecting physical targets, such as utilities and infrastructure.

Feature Image

Articles
Internet of Things

Executive Roundtable: Sensing and IIoT

Four industry experts explore the future outlook for smart sensors and IIoT.

Feature Image

Features
IoMT

Is Healthcare Ready to Pick Up the Pace in Cybersecurity?

Healthcare organizations face very difficult choices in balancing patient protection with financial demands.

Feature Image

News
Manned Systems

Defending the Heavy-Vehicle Cyber Domain

The COVID-19 pandemic has served as a stark reminder of trucking’s essential role in keeping the economy moving. Hacking commercial vehicles poses grave risks that should not be ignored;...

Feature Image

Briefs
Software

Industrial Software Integrates With IT

Modern PLCs now include IT-capable software and communications protocols, empowering users to easily access edge-sourced data and integrate it with the enterprise.

Feature Image

Application Briefs
RF & Microwave Electronics

Secure Wireless Communication System

pureLiFi has announced a new deal to supply the US Army Europe and Africa with Kitefin™, a next generation optical wireless communication system

Feature Image

SAE Standards News
Data Acquisition

SAE and ISO Publish Joint Automotive Cybersecurity Standard

The new standard that will help ensure that cybersecurity is entwined throughout the entire product lifecycle.

Feature Image

Technology Leaders
Connectivity

Innovative IoT Sensor Applications Pave the Way to the Future

Sensors play a pivotal role in solving critical business challenges.

Feature Image

News
Energy

ZF Hikes Performance of ProAI Supercompute Platform

Although multinational supplier ZF is widely recognized for conventional components such as its transmissions and braking systems, at April’s Auto Shanghai – one of the few major...

Feature Image

Briefs
Regulations/Standards

Cyber Risk Assessment and Scoring Model for Small Unmanned Aerial Vehicles

Learn about a cyber risk assessment methodology tailored for small UAVs.

Feature Image

Briefs
Semiconductors & ICs

Transistor Design Disguises Key Computer Chips from Hackers

This built-in security measure would prevent hackers from getting enough information about the circuit to reverse-engineer it.

Feature Image

News
Connectivity

Automotive Cybersecurity Needs Serious Work

According to the BlackBerry 2021 Threat Report, which looks at cybersecurity threats of all types on a global basis, “modern automobiles are effectively insecure networks.” The authors...

Feature Image

Articles
Sensors/Data Acquisition

Executive Roundtable: Facility & Network Security

Tech Briefs asks industry experts about cybersecurity, the cloud, wireless devices, and securing a remote workforce.

Feature Image

Articles
Sensors/Data Acquisition

2020 Create the Future Design Contest: Electronics/Sensors/IoT Category Winner – PrintIC Flexible Circuits

With PrintIC technology, sensors, actuators, energy supplies, and ICs can be printed on the same substrate, avoiding assembly cost.

Feature Image

Articles
Data Acquisition

Information Warfare: Staying Protected at the Edge

Securing data shared and stored on the battlefield will require hardware with built-in cybersecurity features

Feature Image

Briefs
Manufacturing & Prototyping

Algorithm Defends Against Side-Channel Attacks on Hardware

The algorithm provides an extra layer of safety and security against hackers of electronic devices.

Feature Image

Briefs
Software

Algorithm Protects Networks by Detecting Adversarial Actions

A higher-order network could be built that looks for subtle changes in data that point to suspicious activity.

Feature Image

Application Briefs
Internet of Things

Smart Sensors for Hazardous Areas

Smart sensors for hazardous areas monitor essential assets, such as motors and pumps.

Feature Image

Application Briefs
Data Acquisition

Operating System Software

Learn about the The INTEGRITY-178 tuMP RTOS.

Feature Image