Zero Trust becomes the foundation of cyber security

2 hours ago 2

Another critical issue is data poisoning and model corruption. Attackers can intentionally insert compromised data during the training of an AI model, skewing its behavior or embedding hidden backdoors. This type of manipulation can compromise the integrity of systems designed to make autonomous decisions in the field.

Ciufo also points to the growing problem of over-reliance on opaque machine-learning models. Many of these systems operate as "black boxes," where decisions can’t easily be traced or justified. In mission-critical scenarios where human oversight and accountability are essential, that lack of explainability becomes a liability.

Beyond that, adversaries are already using AI to enhance their own cyber capabilities, streamlining reconnaissance, automating exploit development, and identifying vulnerabilities faster than conventional methods. Finally, the use of third-party datasets and platforms in training military AI models can introduce hidden weaknesses into the supply chain, posing long-term risks to system security.

Modern solutions

To meet evolving security demands in defense computing, companies are adapting their products with Zero Trust and trusted computing principles in mind. At Pixus Technologies, that effort is reflected in the development of the SHM300 Tier 3 SOSA-aligned chassis manager, which incorporates several key architectural decisions aimed at hardening embedded system security.

Working alongside software and firmware partner Crossfield Technology, Pixus selected Microchip’s PolarFire FPGA for the SHM300, citing its enhanced encryption and networking capabilities as essential for modern security requirements. "We made some key decisions early-on to prepare for security measures for our SHM300 Tier 3 SOSA aligned chassis manager," says Justin Moll, Vice President of Sales and Marketing at Pixus Technologies. The company also opted for a full-feature Linux operating system, rather than a scaled-down version, in order to support a complete TCP/IP networking stack -- enabling more robust communications and security protocols.

The SHM300 leverages a mezzanine-based design and utilizes a RESTful interface to implement and manage security features. To further reduce risk, Pixus has recently added a fiber Ethernet option, which helps deter electronic eavesdropping and physical snooping, particularly in environments where wired connections may be exposed.

At General Micro Systems, Ciufo says that the emphasis remains squarely on hardware-based security, which the company considers the gold standard for protecting sensitive military systems. While software-based protections are useful and often necessary, GMS customers consistently favor physical safeguards implemented at the hardware level.

"Given the choice between hardware-based security at the bare metal versus software security, customers choose hardware all day, every day," says Ciufo.

That preference drives demand for real, tactile controls rather than software-based interfaces -- hardwired buttons instead of digital prompts, and direct security logic instead of watchdog timers that may be bypassed or delayed.

To meet these requirements, GMS integrates several layers of physical security features across its systems. Many platforms include a dedicated "Zero" button that triggers a secure zeroization process. A single press erases the drives, and a second press wipes the BIOS, effectively rendering the system inoperable. Anti-tamper switches and sensors detect unauthorized access to the chassis and initiate the same zeroization protocol. The company’s Enhanced SecureDNA suite adds further protections, including daisy-chained "Intruder" cables. If disconnected during an attempt to extract hardware modules from a vehicle or system, these cables trigger a complete hardware lockout -- bricking the device and preventing data exfiltration or reverse engineering.

"Hardware-based security can complement software-based security," says Jaenicke from Green Hills Software. "For example, a data diode, which provides one-way data transfer, is best implemented in hardware using optical isolation techniques to ensure there is no return data path. On the other hand, a data guard, which performs content inspection and filtering, is best implemented in software. The software data guard can more easily adapt to new types of malware and unauthorized data transfers. Using a hardware data diode and a software data guard together provides the highest level of protection against data leaks."

Jaenicke says that data diodes and data guards are two components of a cross-domain solution (CDS), which provides the ability to access or transfer information between different security domains. "Many CDSs live in data centers, but a tactical CDS can be used in deployed weapon systems," Jaenicke informs. "An example of a high-end, tactical CDS is the one used in the US Navy’s Tactical Combat Training System Increment II (TCTS II) from Collins Aerospace. TCTS II is a real-time operational air combat training system that blends live, virtual, and constructive training elements. TCTS II fields the first certified multi-level security (MLS) training equipment in airborne and ground equipment to protect the tactics, techniques, and procedures being used.

He continues, "TCTS II also provides interoperability for joint and coalition training with fourth and fifth-generation platforms while aligning with industry software standards such as the FACE Technical Standard and Software Communications Architecture (SCA). Collins Aerospace uses the INTEGRITY-178 tuMP RTOS as the foundation of their tactical CDS in TCTS II, and that CDS is certified to NSA’s 'Raise the Bar' security standard."

Read Entire Article