<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=235929&amp;fmt=gif">

Blogs by Trenton Systems / Cybersecurity

What is an FPGA (Field Programmable Gate Array)?

What is an FPGA (Field Programmable Gate Array)?

Due to the complex, data intensive nature of HPC workloads, computing infrastructures must be equipped to accelerate and enhance these tasks while being tailored to an end user's application needs. In this blog, you'll learn more about what an FPGA is, how it works, various use cases, …

Read Story

Trenton Systems partners with Raytheon to bolster resilient, zero-trust architected computing

Trenton Systems partners with Raytheon to bolster resilient, zero-trust architected computing

Read Story

International prime contractor chooses Trenton Systems for autonomous maritime program

International prime contractor chooses Trenton Systems for autonomous maritime program

Read Story

What is FIPS 140-3?

What is FIPS 140-3?

With advanced cyberattacks on the rise, technology that handles and encrypts critical data must be secure and reliable at all times, at all levels. In this blog, you'll learn more about FIPS 140-3, why it's important, and how it differs from FIPS 140-2 to enhance protection of data-at …

Read Story

What is a Cross Domain Solution (CDS)?

Data often moves between areas with varying classification and security levels, prompting the need for a solution that can guard critical data, irrespective of where it is traveling, from unauthorized access. In this blog, you'll learn what a cross domain solution (CDS) is, how it wor …

Read Story

Intel® PFR, SGX, and TME in Action: Use Cases and Applications

Intel® PFR, SGX, and TME in Action: Use Cases and Applications

As cyberattacks increase in sophistication, security measures must evolve to boost protection against these ever-evolving threats to create a secure foundation, guard workloads, and enhance software resilience. In this blog, we'll take a look at three Intel® hardware-enabled technolog …

Read Story

Top Cybersecurity Technologies for 2023

Cybersecurity Explained

As our world becomes increasingly digitized, protecting critical mission systems across the hardware, firmware, and software layer stack is vital. In this blog, you'll learn about the technologies necessary to secure your high-performance computing solutions (HPCs) against unauthorize …

Read Story

How to Secure Your Operating System (OS)

Secure Your Operating System

Failure to protect your operating system, perhaps the most important software on a computer, can lead to various kinds of cyberattacks, impeding performance and compromising critical data. In this blog, you'll learn how to secure your OS in order to protect its confidentiality, functi …

Read Story

What is Full-Disk Encryption (FDE)?

Disks and drives store massive amounts of critical data, making their security against cybercriminals a top priority. In this blog, you'll learn what full-disk encryption (FDE) is and why it is critical to the protection of an entire disk volume and all files on a drive against unauth …

Read Story

What is IPMI? A Guide to Intelligent Platform Management Interface

A BMC (Baseboard Management Controller), which is an embedded computer that can access and control all of a server's resources, uses remote management capabilities to increase efficiency but can be hacked at any time, posing security risks. In this blog, you'll learn what IPMI (Intell …

Read Story

Subscribe by email