<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=235929&amp;fmt=gif">

Blogs by Trenton Systems / Cybersecurity

by Christopher Trick, on Mar 23, 2022 9:00:00 AM

As our world becomes increasingly digitized, protecting critical mission systems across the hardware, firmware, and software layer stack is vital. In this blog, you'll learn about the technologies necessary to …

Read Story
Topics:CybersecuritytechnologyHPC

by Christopher Trick, on Mar 22, 2022 9:13:31 AM

Failure to protect your operating system, perhaps the most important software on a computer, can lead to various kinds of cyberattacks, impeding performance and compromising critical data. In this blog, …

Read Story
Topics:Cybersecurityoperating systemdata protection

by Christopher Trick, on Mar 22, 2022 9:12:50 AM

Disks and drives store massive amounts of critical data, making their security against cybercriminals a top priority. In this blog, you'll learn what full-disk encryption (FDE) is and why it is …

Read Story
Topics:Cybersecuritydata protectionfull disk encryption

by Christopher Trick, on Mar 21, 2022 11:03:45 AM

Source: zenlayer.com A BMC (Baseboard Management Controller), which is an embedded computer that can access and control all of a server's resources, uses remote management capabilities to increase efficiency but …

Read Story
Topics:CybersecurityIPMIhardware monitoring

by Christopher Trick, on Mar 18, 2022 10:35:59 AM

As cyberattacks become more advanced, traditional safeguards and authentication measures like usernames and passwords provide operating systems with less protection. In this blog, you'll learn more about what pre-boot and post-boot authentication are and their role in protecting critical data against …

Read Story
Topics:Cybersecuritypre-bootpost-bootauthentication

by Christopher Trick, on Mar 9, 2022 9:00:00 AM

As the world become increasingly digitized through the use of computers, cloud services, and other virtual tools, organizations and individuals have become more vulnerable to data breaches. In this blog, you'll …

Read Story
Topics:Cybersecurityhardware virtualizationhypervisor

by Christopher Trick, on Feb 15, 2022 6:37:18 PM

As cyberattacks become increasingly sophisticated, traditional security methods such as requiring a username and password prove to be inadequate safeguards against unauthorized access. In this blog, you'll learn the importance …

Read Story
Topics:Cybersecurityprotectionmulti-factor authentication

by Christopher Trick, on Nov 19, 2021 7:04:18 PM

Unlock the secrets of the latest update to the Cybersecurity Maturity Model Certification (CMMC) and find out how it provides strengthened security of unclassified data against hacker attacks. What is …

Read Story
Topics:CybersecuritycertificationCMMC 2.0

by Brett Daniel, on Apr 14, 2021 4:04:57 PM

Graphic: System hardening is all about protecting your server or workstation. Did you know that the U.S. government allocated an estimated $18.78 billion for cybersecurity spending in 2021? The reason …

Read Story
Topics:CybersecuritySystem hardeningSystem hardening best practices

by Brett Daniel, on Apr 6, 2021 11:00:00 AM

Photo: The 3U BAM Server Lawrenceville, Georgia, April 6, 2021 -- Trenton Systems, a manufacturer of cybersecure, rugged, made-in-USA computing solutions, has released its long-awaited 3U BAM Server, a dynamic, high-performance military computer designed …

Read Story
Topics:Rugged computersRugged serversIntelCybersecurityEdge serversPlatform Firmware Resilience (PFR)software securityhardware securityfirmware security3U BAM ServerSoftware Guard Extensions (SGX)
Content not found

Trenton Systems Blog

Our blogs cover the latest ruggedized computing news and company updates.

More...

Subscribe to Updates