<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=235929&amp;fmt=gif">

Blogs by Trenton Systems / Cybersecurity

by Christopher Trick, on Oct 16, 2022 3:00:00 PM

DULUTH, GA—Trenton Systems has secured a multi-million dollar program win from an international prime contractor for an autonomous maritime threat detection program. The integration of autonomous, secure, high-performance computers with compute density for …

Read Story
Topics:CybersecurityHigh-performance computersSWaP-Cautonomous

by Christopher Trick, on Oct 12, 2022 3:12:44 PM

With advanced cyberattacks on the rise, technology that handles and encrypts critical data must be secure and reliable at all times, at all levels. In this blog, you'll learn more …

Read Story
Topics:CybersecurityFederal Information Processing Standards (FIPS)self-encrypting drives (SEDs)FIPS 140-3

by Christopher Trick, on Sep 21, 2022 9:08:47 AM

Source: BAE Systems. Data often moves between areas with varying classification and security levels, prompting the need for a solution that can guard critical data, irrespective of where it is …

Read Story
Topics:CybersecurityHigh-performance computersdata protectionCross domain solutions

by Christopher Trick, on Sep 7, 2022 12:18:44 PM

As cyberattacks increase in sophistication, security measures must evolve to boost protection against these ever-evolving threats to create a secure foundation, guard workloads, and enhance software resilience. In this blog, we'll …

Read Story
Topics:IntelCybersecurityPlatform Firmware Resilience (PFR)Software Guard Extensions (SGX)High-performance computersTotal Memory Encryption (TME)

by Christopher Trick, on Mar 23, 2022 9:00:00 AM

As our world becomes increasingly digitized, protecting critical mission systems across the hardware, firmware, and software layer stack is vital. In this blog, you'll learn about the technologies necessary to …

Read Story
Topics:CybersecuritytechnologyHPC

by Christopher Trick, on Mar 22, 2022 9:13:31 AM

Failure to protect your operating system, perhaps the most important software on a computer, can lead to various kinds of cyberattacks, impeding performance and compromising critical data. In this blog, …

Read Story
Topics:Cybersecurityoperating systemdata protection

by Christopher Trick, on Mar 22, 2022 9:12:50 AM

Disks and drives store massive amounts of critical data, making their security against cybercriminals a top priority. In this blog, you'll learn what full-disk encryption (FDE) is and why it is …

Read Story
Topics:Cybersecuritydata protectionfull disk encryption

by Christopher Trick, on Mar 21, 2022 11:03:45 AM

Source: zenlayer.com A BMC (Baseboard Management Controller), which is an embedded computer that can access and control all of a server's resources, uses remote management capabilities to increase efficiency but …

Read Story
Topics:CybersecurityIPMIhardware monitoring

by Christopher Trick, on Mar 18, 2022 10:35:59 AM

As cyberattacks become more advanced, traditional safeguards and authentication measures like usernames and passwords provide operating systems with less protection. In this blog, you'll learn more about what pre-boot and post-boot authentication are and their role in protecting critical data against …

Read Story
Topics:Cybersecuritypre-bootpost-bootauthentication

by Christopher Trick, on Mar 9, 2022 9:00:00 AM

As the world become increasingly digitized through the use of computers, cloud services, and other virtual tools, organizations and individuals have become more vulnerable to data breaches. In this blog, you'll …

Read Story
Topics:Cybersecurityhardware virtualizationhypervisor
Content not found

Trenton Systems Blog

Our blogs cover the latest ruggedized computing news and company updates.

More...

Subscribe to Updates