SUCCESS STORIES

By incorporating Crucible into its airborne radar processing system, one major defense contractor leapfrogged the competition in only a year to provide a system far superior to those of traditional industry leaders.

READ MORE

SUCCESS STORIES

When one defense contractor’s in-house security solution failed, leaving it with little margin to meet a looming deadline, Star Lab moved quickly to deliver a timely solution that met all technical requirements.

READ MORE

CASE HISTORIES

WHITE PAPERS

Tac-V: A New Design Paradigm for Combat Systems

Tac-V: A New Design Paradigm for Combat Systems

Cyber-attacks against high-value combat management and weapons control systems are a growing concern across the Department of Defense. Approaches to securing and defending safety-critical or mission-critical systems like the AEGIS Weapon System (AWS) and Ship Self-Defense System (SSDS) vary from basic network firewalls to persistent threat monitoring.
Download White Paper

Titanium: Guidelines for Securing Combat Systems

Titanium: Guidelines for Securing Combat Systems

Cyber-attacks against mission-critical combat systems are a growing concern across the Department of Defense. Existing approaches to securing and defending these systems almost universally adopt methods used to protect enterprise systems such as: basic network firewalls, persistent threat monitoring and auditing.
Download White Paper