Latest News
Washington D.C — June 3, 2024 — Star Lab Corp®, a global leader in delivering technology protection and embedded security solutions for mission-critical systems, announced their new capabilities for Kevlar Embedded Security: a Yocto Project-based security solution for Linux-based systems at the intelligent edge.
The new capabilities protect critical data and applications at-rest and at runtime, addressing threats from multiple commonly used attack vectors. Leveraging containerization isolation, Kevlar Embedded Security ensures a protected container cannot be accessed or inspected, ensuring critical data used by a container also stays protected.
Washington D.C — June 3, 2024 — Star Lab Corp®, a global leader in delivering technology protection and embedded security solutions for mission-critical systems, announced their new capabilities for Kevlar Embedded Security: a Yocto Project-based security solution for Linux-based systems at the intelligent edge.
The new capabilities protect critical data and applications at-rest and at runtime, addressing threats from multiple commonly used attack vectors. Leveraging containerization isolation, Kevlar Embedded Security ensures a protected container cannot be accessed or inspected, ensuring critical data used by a container also stays protected.
Washington D.C — Jan. 23, 2024 — Star Lab Corp®, a global leader in delivering technology protection software for mission-critical systems, today announced the release of Titanium for KVM, its response to the growing need for an easily implemented security solution for Kernel-based Virtual Machines (KVM). The culmination of a multi-year effort, this solution extends Star Lab’s Titanium Technology Protection capabilities to support the KVM host, an open-source virtualization technology that turns Linux into a hypervisor.
Star Lab Corp®, a global leader in delivering embedded security solutions for mission-critical systems, announced the release of Kevlar System Inspector: a free test suite that examines the inherent security of intelligent devices and IoT systems such that they are secure by design.
Star Lab Corp®, a global leader in delivering technology protection software for mission-critical systems, announced that Aptiv PLC (NYSE: APTV) has completed the acquisition of Wind River® and its subsidiaries as of December 23, 2022.
EVENTS
Star Lab Blog
Symbolic links, or symlinks, are a feature pretty familiar to anyone with a *nix background. These file shortcuts have been around in Unix since the early 1980s and have been a part of POSIX since its inception. Today they are supported almost everywhere: Linux, MacOS, Android, every flavor of Unix, and even Windows supports symlinks. They are ubiquitous, convenient, useful…and occasionally dangerous.
For organizations operating within regulated environments, it is important that their systems be robustly protected against potential attacks. Many times, this is done through the use of Security Technical Implementation Guides (STIGs) applied to their system. Until recently, it has been unclear what, if any, STIGs are available for Linux-based virtualized systems.
FMS-readiness is quickly emerging as an important element to the U.S. National Defense Strategy. With roughly $41B[1] being spent on FMS cases each year, The U.S.’s efforts to prevent the rogue development and unintended transfer of critical military technologies continues with importance. Still, FMS programs are expensive and fraught with risk. These programs have more stakeholders, expanding requirements, and demands to protect critical technology. Unfortunately, most baseline programs, if triggered to perform an FMS program for the first time, are surprised at the requirements and often take an adversarial posture to meeting them. To counter this attitude and continue the important function of protecting our critical technology, programs should adopt an FMS-ready mindset during baseline development.
Have you seen Top Gun? Not the second one, the original. It’s a great movie for sure. The flying, the music, the iconic volleyball scene. However, there is a thread, a movement, through the movie where Maverick turns from his callsign. He transforms from a “Go it alone” pilot no one can trust to a teammate, beloved and celebrated. Zero trust … Maverick’s Top Gun classmates had zero trust in the rash, undisciplined, unproven pilot. This same skepticism is at the core of today’s promotion of a new security paradigm called Zero Trust. For decades, static, network-based defenses have been employed, and even worse, they have been assumed to be effective. Nothing is further from the truth.