Next-generation defense and aerospace applications are smarter and increasingly more autonomous. To be trusted and deployable anywhere, they require both proven systems security engineering (SSE) and the assurance of flight-safety certification. This whitepaper discusses the challenges and evolving methods of combining the often-competing but equally required assurance of private SSE and “public” flight-safety certification that is enabling modern processing systems to be deployed anywhere.
Recommended
Learn about critical technology for next-gen army vehicle autonomous driving, navigation and advanced teaming capabilities, key computing architectures such as GCIA / CMFF, & security / anti-tamper.
The NSA Type 1 encryption program has a rich and complex history, shaped by evolving threats, technological advancements, and the need to protect classified information.
Encryption is a critical component of data security, providing a reliable method for ensuring the security and confidentiality of sensitive data for government, defense, and aerospace...
Discover how the U.S. Navy utilizes Mercury's scalable and configurable HD modular blade servers to simultaneously partition, process, and store adjacent levels of classified information.
Mercury's rugged #edge servers accelerate compute-heavy mission-critical applications like artificial intelligence (#AI), signals intelligence (SIGINT), virtualization and #bigdata analytics. Purpose-
Learn how Mercury delivers uncompromised secure, and trusted solutions using a foundation based on Mitre's Deliver Uncompromised: Securing Critical Software Supply Chains
Taking secure computing to the tactical edge requires a built-in multilayered security approach from system startup to system availability. Listen in as experts from Mercury Systems and Intel...
While I’ve tried to refrain from using the new cliché “these are unprecedented times,” I cannot think of a better way to describe what we are facing with COVID-19. Like the other functions within...
Although we all love connectivity and the benefits it brings us, there is a downside. By now, we’ve all heard about cars that have been hacked. Wired magazine even has an entire section of their...
In part 3 of our blog series learn about VICTORY and how complementing PNT systems can be combined together in a military vehicle and integrated with other military ground vehicle systems
I used to work for a company that required us to remove any proprietary data from our laptop hard drive prior to traveling to some countries overseas. I didn’t know if it was because they could...
Designing post-quantum cryptography (PQC) is much more than just implementing an algorithm. You need industry-leading solutions that address all aspects of advanced cryptographic development. Read...
Electronic battlefield complexity is a growing challenge. New, more sophisticated RF processing capabilities must be rapidly developed and deployed to operate successfully in contested environments.
Did you know your computer could be untrustworthy, even before you take it out of the box? Read more about how trust is compromised through the supply chain and ways you can prevent it.
There is a gap within the community for reliable providers of secure, scalable and affordable subsystems that can support critical programs. Learn how we fill this gap with our "built-in" security.
DAL (design assurance) flight-safety certification and systems security engineering (SSE) is required to protect systems and mitigate risk for future smart and autonomous platforms
Learn how Mercury and Intel collaborate to scale and deploy composable data center capabilities across the fog and edge layers with high performance embedded computing (HPEC)
Mercury Systems is partnering with Intel to develop high-performance, ruggedized, and secure edge computing solutions that enable mission-critical applications in the harshest environments.
Learn about security domains, how traditional cross-domain solution (CDS) pose cybersecurity risks and how a new CDS model using FPGAs can mitigate this risk and support modern IoT, AI and 5G.
Taking secure computing to the tactical edge requires a built-in multilayered security approach from system startup to system availability. Listen in as Mercury and Intel discuss their collaboration