Next-generation defense and aerospace applications are smarter and increasingly more autonomous. To be trusted and deployable anywhere, they require both proven systems security engineering (SSE) and the assurance of flight-safety certification. This whitepaper discusses the challenges and evolving methods of combining the often-competing but equally required assurance of private SSE and “public” flight-safety certification that is enabling modern processing systems to be deployed anywhere.
Taking secure computing to the tactical edge requires a built-in multilayered security approach from system...
Discover how the U.S. Navy utilizes Mercury's scalable and configurable HD modular blade servers to simultaneously partition, process, and store adjacent levels of classified information.
Designing post-quantum cryptography (PQC) is much more than just implementing an algorithm. You need industry-leading solutions that address all aspects of advanced cryptographic development. Read...
Electronic battlefield complexity is a growing challenge. New, more sophisticated RF processing capabilities must be rapidly developed and deployed to operate successfully in contested environments.
Did you know your computer could be untrustworthy, even before you take it out of the box? Read more about how trust is compromised through the supply chain and ways you can prevent it.
There is a gap within the community for reliable providers of secure, scalable and affordable subsystems that can support critical programs. Learn how we fill this gap with our "built-in" security.
DAL (design assurance) flight-safety certification and systems security engineering (SSE) is required to protect systems and mitigate risk for future smart and autonomous platforms
Learn how Mercury and Intel collaborate to scale and deploy composable data center capabilities across the fog and edge layers with high performance embedded computing (HPEC)
Mercury Systems is partnering with Intel to develop high-performance, ruggedized, and secure edge computing solutions that enable mission-critical applications in the harshest environments.
Cloud-scalable cross-domain solution methodologies, challenges and implementations for rapid, secure and correct information transfer between multiple security domains.
Ten years ago, cloud computing hadn’t yet hit the mainstream. Amazon Web Services was only a few years old, Apple’s iCloud didn’t yet exist, and the “as-a-service” markets (IaaS, PaaS, SaaS) were...
Taking secure computing to the tactical edge requires a built-in multilayered security approach from system startup to system availability. Listen in as Mercury and Intel discuss their collaboration
Learn what big data is and why the military relies on big data data pipelines to drive artificial intelligence and ensure mission success in the multi-domain battlefield.
Mercury Systems is a next-generation defense electronics company making commercial technologies profoundly more accessible to aerospace and defense. Watch the interactive virtual conversation with...
As the DoD shifts to a new paradigm for future modernization, see how Mercury Systems is collaborating with our semiconductor partners to make the most advanced commercial microelectronics...
In the first two posts of this series, I reviewed fundamental terms and concepts of encryption key classifications and discussed roles of passwords versus keys and hash algorithms. In this post,...
In my introduction to military grade SSDs I conjured an image from a familiar movie of a data recorder destroyed by internal combustion to remove evidence of high value data. While the end result...
For the modern battlefield with hypersonic weapons, “real-time” answers enabled by 5G are critical. Learn the promises and pitfalls of 5G and how it can be made secure and reliable.
NAND flash, packaged as a Solid State Drives (SSD), are now a common component in defense equipment. Add security and SSDs become the ideal big-data secure storage solution for defense application.
By working at the chip level and leveraging new 2.5D system-in-package capabilities, designers can combine complex semiconductor dies into a single component while maintaining trust and security.
Maximum protection, and full compliance with CSfC program guidelines, can only be achieved with proven diversity in the selection of security components.