Star Lab Software
Contact Us
Titanium Technology Protection Kevlar Embedded Security Secure Boot Services
White Papers Blog Newsroom Partners Release Notes Webinars
About Star Lab Careers Privacy Policy Events
Products Titanium Technology Protection Kevlar Embedded Security Secure Boot Services Resources White Papers Blog Newsroom Partners Release Notes Webinars About About Star Lab Careers Privacy Policy Events
Star Lab Software
EMBEDDED SECURITY | TECHNOLOGY PROTECTION | EMBEDDED SECURITY
Contact Us
Secure Your Platform for the Cyber Resilience Act
Secure Your Platform for the Cyber Resilience Act

Secure Your Platform for the Cyber Resilience Act

Hardware Vendors as Security Enablers

Hardware Vendors as Security Enablers

Protecting Electronic Warfare Platforms

Protecting Electronic Warfare Platforms

7 Tenets of Layered Security in Embedded Design

7 Tenets of Layered Security in Embedded Design

Software Security By Design

Software Security By Design

Star Lab is a leading software security provider dedicated to delivering security solutions for both commercial and government customers. The company tackles the most challenging cyber problems including proactive protection of the system even during sophisticated, targeted attacks. Star Lab prides itself on having a strong focus of technical leadership, subject matter expertise, and a pedigree of developing creative and high-quality products and capabilities.

Building Security Into Embedded Linux Implementations

Building Security Into Embedded Linux Implementations

The cybersecurity industry today is focused on delivering solutions that prevent entry into a system. While this is necessary, it is undeniable that attackers continue to find ways around these security measures. This paper demonstrates how to go beyond bolt-on prevention tactics to build security into your systems from the start, so they are resilient to successful attacks. You will discover how to make systems secure by design with security solutions that are flexible and easy to integrate during the development phase.

System Call Filtering in Linux: An Unsung Hero

System Call Filtering in Linux: An Unsung Hero

Titanium Secure Boot vs. UEFI Secure Boot

Titanium Secure Boot vs. UEFI Secure Boot

Titanium Secure Boot (a form of Measured Boot) and UEFI Secure Boot are similar in that they verify the authenticity of boot-time components; however, they vary greatly in terms of how verification is performed and to what level of granularity.

Tactical Virtualization: A New Design Paradigm for Combat Systems

Tactical Virtualization: A New Design Paradigm for Combat Systems

Cyber-attacks against high-value combat management and weapons control systems are a growing concern across the Department of Defense. Approaches to securing and defending safety-critical or mission-critical systems like the AEGIS Weapon System (AWS) and Ship Self-Defense System (SSDS) vary from basic network firewalls to persistent threat monitoring.

Titanium for Linux: Guidelines for Securing Combat Systems

Titanium for Linux: Guidelines for Securing Combat Systems

Cyber-attacks against mission-critical combat systems are a growing concern across the Department of Defense. Existing approaches to securing and defending these systems almost universally adopt methods used to protect enterprise systems such as: basic network firewalls, persistent threat monitoring and auditing.

Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Sytems

Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Sytems

The Wind River® acquisition of Star Lab combines proven anti-tamper and cybersecurity software for Linux from Star Lab with market-leading embedded software solutions for the intelligent edge from Wind River. Together, the Wind River–Star Lab product portfolio can meet the demanding aerospace and defense (A&D) requirements by protecting classified and/ or sensitive data at rest, delivering secure embedded systems, protecting communication between devices and across systems, safeguarding them over time, and responding quickly as new threats emerge.

Beyond SE Linux: Enforcing Confidentiality and Integrity for Applications and Data

Beyond SE Linux: Enforcing Confidentiality and Integrity for Applications and Data

One question we frequently get is “Why would I use something like Titanium Security Suite, instead of other Linux Security Modules (LSMs) like SELinux or AppArmor?”.

In short, there’s no reason you can’t use both.

SELinux and Titanium primarily differ in their threat model, concept of operations (CONOPS), and flexibility.

Data Protection Whitepaper Cover Image.png
Protecting Unmanned Vehicles Against Battlefield Loss

Protecting Unmanned Vehicles Against Battlefield Loss

1 2 3 4 5 6 7 8 9 10 11 12 13 14
Previous Next
Secure Your Platform for the Cyber Resilience Act
Hardware Vendors as Security Enablers
Protecting Electronic Warfare Platforms
7 Tenets of Layered Security in Embedded Design
Software Security By Design
Building Security Into Embedded Linux Implementations
System Call Filtering in Linux: An Unsung Hero
Titanium Secure Boot vs. UEFI Secure Boot
Tactical Virtualization: A New Design Paradigm for Combat Systems
Titanium for Linux: Guidelines for Securing Combat Systems
Meeting Cybersecurity, Safety, and Reliability Controls for Your Linux-Based Sytems
Beyond SE Linux: Enforcing Confidentiality and Integrity for Applications and Data
Data Protection Whitepaper Cover Image.png
Protecting Unmanned Vehicles Against Battlefield Loss

About Star Lab Events Careers Contact Us Privacy
© 2023 Star Lab Corporation. All Rights Reserved.

Star Lab Corporation
1250 H Street NW Suite 620,
Washington, DC, 20005,
United States
(202) 706 – 7027 info@starlab.io
Hours
Mon 8am - 5pm
Tue 8am - 5pm
Wed 8am - 5pm
Thu 8am - 5pm
Fri 8am - 5pm