<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=235929&amp;fmt=gif">

Blogs by Trenton Systems / Cybersecurity (2)

by Christopher Trick, on Mar 18, 2022 10:35:59 AM

As cyberattacks become more advanced, traditional safeguards and authentication measures like usernames and passwords provide operating systems with less protection. In this blog, you'll learn more about what pre-boot and …

Read Story
Topics:Cybersecuritypre-bootpost-bootauthentication

by Christopher Trick, on Mar 9, 2022 9:00:00 AM

As the world become increasingly digitized through the use of computers, cloud services, and other virtual tools, organizations and individuals have become more vulnerable to data breaches. In this blog, …

Read Story
Topics:Cybersecurityhardware virtualizationhypervisor

by Christopher Trick, on Feb 15, 2022 6:37:18 PM

As cyberattacks become increasingly sophisticated, traditional security methods such as requiring a username and password prove to be inadequate safeguards against unauthorized access. In this blog, you'll learn the importance …

Read Story
Topics:Cybersecurityprotectionmulti-factor authentication

by Brett Daniel, on Apr 14, 2021 4:04:57 PM

Graphic: System hardening is all about protecting your server or workstation. Did you know that the U.S. government allocated an estimated $18.78 billion for cybersecurity spending in 2021? The reason …

Read Story
Topics:CybersecuritySystem hardeningSystem hardening best practices

by Brett Daniel, on Apr 6, 2021 11:00:00 AM

Photo: The 3U BAM Server Lawrenceville, Georgia, April 6, 2021 -- Trenton Systems, a manufacturer of cybersecure, rugged, made-in-USA computing solutions, has released its long-awaited 3U BAM Server, a dynamic, …

Read Story
Topics:Rugged computersRugged serversIntelCybersecurityEdge serversPlatform Firmware Resilience (PFR)software securityhardware securityfirmware security3U BAM ServerSoftware Guard Extensions (SGX)

by Brett Daniel, on Feb 26, 2021 4:00:00 PM

Graphic: Trenton Systems and its security partners strongly believe in comprehensive cybersecurity solutions, starting with the hardware that underlies your server or workstation. Recent high-profile cyberattacks and shocking revelations about …

Read Story
Topics:Computer hardwareCybersecurityFirmwaresoftwaresoftware securityhardware securityfirmware securitysecure by design

by Brett Daniel, on Feb 23, 2021 4:48:44 PM

Graphic: Trenton Systems cares about the security of your computing solution. It's why we place great emphasis on internal cybersecurity practices and investing in cybersecurity solutions that protect each layer …

Read Story
Topics:Industrial computersMilitary computersIndustrial serversIntelMilitary serversComputer hardwareMade in USACybersecurityTAA complianceRevision controlPlatform Firmware Resilience (PFR)

by Jason Barr, on Feb 19, 2021 3:29:23 PM

Photo: Working with a computer hardware manufacturer with a strict revision control system in place is an essential aspect of further securing your cybersecure computing solution. Table of Contents Suppliers …

Read Story
Topics:CybersecurityRevision control

by Trenton Systems, on Feb 16, 2021 10:00:00 AM

Graphic: Trenton Systems is a trusted, longtime provider of cybersecure, high-performance computing solutions for military, industrial, and commercial applications. Trenton Systems, an American manufacturer of secure, high-performance computing solutions, continues …

Read Story
Topics:CybersecurityCounterfeit electronic parts

by Brett Daniel, on Jan 11, 2021 1:41:01 PM

Graphic: The SolarWinds hack shook American businesses and federal agencies in December. We're unpacking the hack in this blog post. Table of Contents What is the SolarWinds Hack? How did …

Read Story
Topics:CybersecurityFederal Information Processing Standards (FIPS)Encryption

Trenton Systems Blog

Our blogs cover the latest ruggedized computing news and company updates.

More...

Subscribe to Updates