Steven Pritchard

  • Is there a Stig for KVM? Investigating Stig Compliance as it Relates to Virtualization

    Is there a Stig for KVM? Investigating Stig Compliance as it Relates to Virtualization

    To achieve security compliance in regulated environments, Mercury recommends a layered approach using host-level STIGs, NIST guidance like SP 800-125, and specialized tools.

    Read Blog
  • Delivering Ground Systems Trainer Under Tight Turnaround

    Delivering Ground Systems Trainer Under Tight Turnaround

    A defense contractor that failed government security checks was able to meet stringent requirements by implementing RelianceOne Security Suite, ensuring timely delivery of its systems.

    Read Blog
  • Achieving Airborne Radar Processing System Superiority

    Achieving Airborne Radar Processing System Superiority

    By partnering with RelianceOne to use the Crucible Hypervisor, a contractor gained a competitive edge in airborne radar processing through secure, high-performance virtualization.

    Read Blog
  • Challenges In Protecting Embedded Linux From Offline Attacks

    Challenges In Protecting Embedded Linux From Offline Attacks

    As embedded Linux systems become more prevalent, they also become more attractive targets for offline attacks. These attacks, which bypass real-time system defenses, can expose sensitive data and comp

    Read Blog
  • loading
    Loading More...