That’s classified! The history and future of NSA Type 1 encryption
The NSA Type 1 encryption program has a rich and complex history, shaped by evolving threats, technological advancements, and the need to protect classified information.
Read Article
Intercepted communications: Encryption standards for the defense edge
Encryption is a critical component of data security, providing a reliable method for ensuring the security and confidentiality of sensitive data for government, defense, and aerospace...
Read Article
Strengthening cybersecurity at the edge: Intel and Mercury talk multilayered security
Taking secure computing to the tactical edge requires a built-in multilayered security approach from system startup to system availability. Listen in as experts from Mercury Systems and Intel...
Read Article
Finding New Supply Chain Muscles in a COVID-19 World
While I’ve tried to refrain from using the new cliché “these are unprecedented times,” I cannot think of a better way to describe what we are facing with COVID-19. Like the other functions within...
Read Article
Safe AND secure avionics? You can do that? Yup!
Although we all love connectivity and the benefits it brings us, there is a downside. By now, we’ve all heard about cars that have been hacked. Wired magazine even has an entire section of their...
Read Article
Can GPS be Trusted? Part 3
In part 3 of our blog series learn about VICTORY and how complementing PNT systems can be combined together in a military vehicle and integrated with other military ground vehicle systems
Read Article
Military-Grade Secure Solid State Drives Part 5: The Backdoor VIPs Don’t Know About
I used to work for a company that required us to remove any proprietary data from our laptop hard drive prior to traveling to some countries overseas. I didn’t know if it was because they could...
Read Article
This is not a drill: Preparing for a severe cyber storm
Designing post-quantum cryptography (PQC) is much more than just implementing an algorithm. You need industry-leading solutions that address all aspects of advanced cryptographic development. Read...
Read Article