
Blog
Managing data securely in cross-domain solutionsCross-domain solutions (CDSs) allow for the secure transfer of information between different security domains, ensuring the…
Mercury SystemsApril 28, 2025
Read More
Blog
Raising the bar: Why cross-domain solutions are critical to data securityCross-domain solutions (CDSs) are a vital component when it comes to the security of our most important digital-based…
Mercury SystemsApril 16, 2025
Read More
Blog
Electromagnetic spectrum superiority in modern defenseThe electromagnetic spectrum is an integral part of our daily lives, yet its complexity often goes unnoticed. In defense, the…
Mercury SystemsNovember 25, 2024
Read MoreVodcast
Delivering innovative technologies to support Army modernization and transformation effortsDr. Eric Gans, Mercury's business development director for advanced technology, shares how Mercury supports the U.S. Army…
Mercury SystemsNovember 8, 2024
Read MoreFeatured

Blog
CHIPS Part 1: National security and the state of domestic chip manufacturingThe international chip-supply situation is putting U.S. security at risk and driving the need for the ...
March 8, 2023
Read MoreBlogs & Podcasts

Although we all love connectivity and the benefits it brings us, there is a downside. By now, we’ve all heard about cars that have been hacked. Wired magazine even has an entire section of their website dedicated to the subject. Anytime you connect to a network, you open up your system to vulnerabilities.
Mercury SystemsApril 19, 2019
Read More
“Volunteers do not necessarily have the time; they just have the heart.”– Elizabeth Andrew On a rainy March day, 5 Mercury employees based in Andover trekked into Boston to participate in our first Boston City Year volunteer event.
Mercury SystemsApril 1, 2019
Read More
In military environments, seconds can be the difference between life or death and mission success or failure. A soldier in hostile territory needs their mobile system to rapidly process sensor data to accurately analyze threats and take action. Intelligent sensor systems using artificial intelligence (AI) to make automatic critical decisions without human intervention rely on […]
Jennifer KeenanMarch 14, 2019
Read More
In my prior three posts, I provided an overview of encryption key fundamentals and the various encryption key mode strategies that can be implemented in a Mercury secure SSD. If you did not read those, stop everything and go back to them now!
Jennifer KeenanMarch 8, 2019
Read More