This is not a drill: Preparing for a severe cyber storm
Designing post-quantum cryptography (PQC) is much more than just implementing an algorithm. You need industry-leading solutions that address all aspects of advanced cryptographic development. Read...
Can you trust your computer? Three ways your system may already be unsafe
Did you know your computer could be untrustworthy, even before you take it out of the box? Read more about how trust is compromised through the supply chain and ways you can prevent it.
Blog: I’ll take my data center to go, please: Celebrating 10 years of deployable data center performance
Ten years ago, cloud computing hadn’t yet hit the mainstream. Amazon Web Services was only a few years old, Apple’s iCloud didn’t yet exist, and the “as-a-service” markets (IaaS, PaaS, SaaS) were...
Enabling a Trusted Domestic Microelectronics Ecosystem
Mercury Systems is a next-generation defense electronics company making commercial technologies profoundly more accessible to aerospace and defense. Watch the interactive virtual conversation with...
A New Paradigm for Defense-Grade Advanced Microelectronics
As the DoD shifts to a new paradigm for future modernization, see how Mercury Systems is collaborating with our semiconductor partners to make the most advanced commercial microelectronics...
Encryption Keys: The Cliff Notes Version, Part 3 – Key Management Modes
In the first two posts of this series, I reviewed fundamental terms and concepts of encryption key classifications and discussed roles of passwords versus keys and hash algorithms. In this post,...
Military-Grade Secure Solid State Drives Part 2: Encryption Decoded
In my introduction to military grade SSDs I conjured an image from a familiar movie of a data recorder destroyed by internal combustion to remove evidence of high value data. While the end result...