Secure Processing
Explore Mercury's secure processing resources to stay up to date and learn how we help keep mission-critical platforms secure with a built-in security framework.
-
59:54Watch VideoWebinar: How to Steal AI Algorithms at the Edge and Protect Them
Artificial Intelligence (AI) algorithms are increasingly deployed in edge environments, raising intellectual property (IP) protection concerns due to heightened risks of tampering, reverse engineering
-
Read NowWhite Paper: Key Technology Considerations for Next-Gen Army Vehicles
Learn about critical technology for next-gen army vehicle autonomous driving, navigation and advanced teaming capabilities, key computing architectures such as GCIA / CMFF, & security / anti-tamper.
-
Read ArticleThat’s classified! The history and future of NSA Type 1 encryption
The NSA Type 1 encryption program has a rich and complex history, shaped by evolving threats, technological advancements, and the need to protect classified information.
-
Read ArticleIntercepted communications: Encryption standards for the defense edge
Encryption is a critical component of data security, providing a reliable method for ensuring the security and confidentiality of sensitive data for government, defense, and aerospace...
-
31:17Watch VideoAI at the Tactical Edge: Securing Machine Learning for Multi-Domain Operations
Mercury Systems, NVIDIA and SigmaX are securing machine learning for multi-domain operations with agile edge servers and cloud-native open software stacks that streamline deployment in theater.
-
23:59Watch VideoAI at the Tactical Edge: Protecting Machine Learning with Data Security
Mercury Systems and Intel are working together to design secure AI edge solutions to protect data and machine learning in the field.
-
Read Now
Case Study: Navy CDS, Simultaneously and Securely Processing Classified Data at Sea
Discover how the U.S. Navy utilizes Mercury's scalable and configurable HD modular blade servers to simultaneously partition, process, and store adjacent levels of classified information.
-
Embedded Board Technology
SEE CONTENT -
2:13Watch VideoMercury Rugged Servers – The Box That Checks All the Boxes
Mercury's rugged #edge servers accelerate compute-heavy mission-critical applications like artificial intelligence (#AI), signals intelligence (SIGINT), virtualization and #bigdata analytics. Purpose-
-
Rugged Server Technology
SEE CONTENT -
Read Now
White Paper: Mercury Assured: Trust that delivers uncompromised solutions to our customers
Learn how Mercury delivers uncompromised secure, and trusted solutions using a foundation based on Mitre's Deliver Uncompromised: Securing Critical Software Supply Chains
-
Read ArticleStrengthening cybersecurity at the edge: Intel and Mercury talk multilayered security
Taking secure computing to the tactical edge requires a built-in multilayered security approach from system startup to system availability. Listen in as experts from Mercury Systems and Intel...
-
Read Article
Finding New Supply Chain Muscles in a COVID-19 World
While I’ve tried to refrain from using the new cliché “these are unprecedented times,” I cannot think of a better way to describe what we are facing with COVID-19. Like the other functions within...
-
Read Article
Safe AND secure avionics? You can do that? Yup!
Although we all love connectivity and the benefits it brings us, there is a downside. By now, we’ve all heard about cars that have been hacked. Wired magazine even has an entire section of their...
-
Read Article
Can GPS be Trusted? Part 3
In part 3 of our blog series learn about VICTORY and how complementing PNT systems can be combined together in a military vehicle and integrated with other military ground vehicle systems
-
Read Article
Military-Grade Secure Solid State Drives Part 5: The Backdoor VIPs Don’t Know About
I used to work for a company that required us to remove any proprietary data from our laptop hard drive prior to traveling to some countries overseas. I didn’t know if it was because they could...
-
Read ArticleThis is not a drill: Preparing for a severe cyber storm
Designing post-quantum cryptography (PQC) is much more than just implementing an algorithm. You need industry-leading solutions that address all aspects of advanced cryptographic development. Read...
-
Read Now
White Paper: Processing Evolution for the Future Electronic Battlespace
Electronic battlefield complexity is a growing challenge. New, more sophisticated RF processing capabilities must be rapidly developed and deployed to operate successfully in contested environments.
-
Read ArticleCan you trust your computer? Three ways your system may already be unsafe
Did you know your computer could be untrustworthy, even before you take it out of the box? Read more about how trust is compromised through the supply chain and ways you can prevent it.
-
Read Now
White Paper: Secure Processing Solutions for the Defense and Intelligence Industry
There is a gap within the community for reliable providers of secure, scalable and affordable subsystems that can support critical programs. Learn how we fill this gap with our "built-in" security.
-
Read Now
White Paper: Building Safe and Secure Systems for Tomorrow's Autonomous Platforms
DAL (design assurance) flight-safety certification and systems security engineering (SSE) is required to protect systems and mitigate risk for future smart and autonomous platforms
-
Read Now
White Paper: Enabling big data processing and AI-powered everything, everywhere
Learn how Mercury and Intel collaborate to scale and deploy composable data center capabilities across the fog and edge layers with high performance embedded computing (HPEC)
-
Loading More...


