Red Hat
Raleigh, NC 27601 https://www.redhat.com/en/solutions?sc_cid=701f2000001D7iwAAC&gclid=CjwKCAiAy9jyBRA6EiwAeclQhMNNOYXJJI7EX95tSfkQcPGM0QJr6afI0qwH6Jn78zREM6oUPFXDHBoCOb4QAvD_BwE&gclsrc=aw.ds
F-22 Raptor fleet upgrades process is accelerated through Lockheed Martin, Red Hat partnership - News
May 08, 2019Cyber
Integrity of embedded systems - Blog
February 28, 2019It is critical to be able to verify the integrity of systems used in military and other applications to ensure that they have not been modified or corrupted. It is of course best to prevent a system from being tampered with. If this can't be done, it is vital to detect tampering. In many cases it is better to prevent a system from operating at all if you can't be sure it hasn't been modified. In all cases it is vital to protect information on the system and especially critical secrets like crypto keys.