Latest News
Washington D.C — Jan. 23, 2024 — Star Lab Corp®, a global leader in delivering technology protection software for mission-critical systems, today announced the release of Titanium for KVM, its response to the growing need for an easily implemented security solution for Kernel-based Virtual Machines (KVM). The culmination of a multi-year effort, this solution extends Star Lab’s Titanium Technology Protection capabilities to support the KVM host, an open-source virtualization technology that turns Linux into a hypervisor.
Star Lab Corp®, a global leader in delivering embedded security solutions for mission-critical systems, announced the release of Kevlar System Inspector: a free test suite that examines the inherent security of intelligent devices and IoT systems such that they are secure by design.
Star Lab Corp®, a global leader in delivering technology protection software for mission-critical systems, announced that Aptiv PLC (NYSE: APTV) has completed the acquisition of Wind River® and its subsidiaries as of December 23, 2022.
Star Lab Corp®, a global leader in delivering technology protection software for mission-critical systems, today announced it is moving to support Kernel-based Virtual Machine (KVM), an open-source virtualization technology that turns Linux into a hypervisor. This development is part of a multi-year effort to optimize Star Lab software to support the growing use of virtualization in industrial and defense systems in the United States.
Washington, DC, June 30, 2022 — Star Lab announced a new version of Cyber Hardening Suite, with several notable updates to the suite’s capabilities. These updates continue to improve Cyber Hardening Suite’s ability to help meet security requirements for customers with embedded devices.
EVENTS
Star Lab Blog
For organizations operating within regulated environments, it is important that their systems be robustly protected against potential attacks. Many times, this is done through the use of Security Technical Implementation Guides (STIGs) applied to their system. Until recently, it has been unclear what, if any, STIGs are available for Linux-based virtualized systems.
FMS-readiness is quickly emerging as an important element to the U.S. National Defense Strategy. With roughly $41B[1] being spent on FMS cases each year, The U.S.’s efforts to prevent the rogue development and unintended transfer of critical military technologies continues with importance. Still, FMS programs are expensive and fraught with risk. These programs have more stakeholders, expanding requirements, and demands to protect critical technology. Unfortunately, most baseline programs, if triggered to perform an FMS program for the first time, are surprised at the requirements and often take an adversarial posture to meeting them. To counter this attitude and continue the important function of protecting our critical technology, programs should adopt an FMS-ready mindset during baseline development.
Have you seen Top Gun? Not the second one, the original. It’s a great movie for sure. The flying, the music, the iconic volleyball scene. However, there is a thread, a movement, through the movie where Maverick turns from his callsign. He transforms from a “Go it alone” pilot no one can trust to a teammate, beloved and celebrated. Zero trust … Maverick’s Top Gun classmates had zero trust in the rash, undisciplined, unproven pilot. This same skepticism is at the core of today’s promotion of a new security paradigm called Zero Trust. For decades, static, network-based defenses have been employed, and even worse, they have been assumed to be effective. Nothing is further from the truth.
At first glance, the latest BlackTech firmware attack isn’t all the interesting as it’s a fairly run of the mill firmware / system-level attack, and that is mostly true. There are, however, a couple aspects worth digging into and discussing in more depth, specifically as they relate to larger system security and extrapolating these concerns to Linux-based systems.