<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=235929&amp;fmt=gif">

Blogs by Trenton Systems / Encryption

What is Intel TME (Total Memory Encryption)?

Memory attacks have quietly emerged as a new class of hacking techniques to undermine conventional security measures, posing a threat to all data that passes through a system. In this blog, you'll learn how Intel TME (Total Memory Encryption) acts as a necessary safeguard for protecti …

Read Story

Symmetric vs. Asymmetric Encryption: What's the Difference?

This is a graphic that reads

Graphic: In this blog post, we discuss the differences between symmetric encryption, a single-key encryption technique, and asymmetric encryption, also known as public-key cryptography, which uses private- and public-key pairs of encryption keys. To transmit a key or not to transmit a …

Read Story

The SolarWinds Orion Hack Explained

A SolarWinds app displayed on a cellphone with a background that reads

Read Story

Trenton Systems partners with FUTURA Cyber for FIPS drive management

Trenton Systems partners with FUTURA Cyber

Graphic: Trenton Systems has partnered with leading cybersecurity solutions company FUTURA Cyber for FIPS 140-2 drive encryption key management. Lawrenceville, Georgia, Monday, Oct. 26, 2020 – – Trenton Systems, Inc., a leading designer and manufacturer of ruggedized, cybersecure, mad …

Read Story

Your All-in-One Guide to Self-Encrypting Drives (SEDs)

A graphic showing binary code layered over a hard drive

Table of Contents What is a self-encrypting drive (SED)? Where can I find self-encrypting drives? How do self-encrypting drives work? Are self-encrypting drives secure? How do I know if my drive is self-encrypting? What level of encryption do self-encrypting drives provide? What's the …

Read Story

Cybersecurity, Data-at-Rest Encryption, and FIPS 140-2

Cybersecurity. It’s the buzzword that keeps rearing its worrisome head in technology-related meetings across the globe. We can chat about COTS and custom rugged computers all day, but why progress any further if cybersecurity isn't a part of the discussion from the very beginning? Unf …

Read Story

Subscribe by email