by Christopher Trick, on Mar 17, 2022 1:57:36 PM
Memory attacks have quietly emerged as a new class of hacking techniques to undermine conventional security measures, posing a threat to all data that passes through a system. In this …
Read Storyby Brett Daniel, on May 4, 2021 9:30:00 AM
Graphic: In this blog post, we discuss the differences between symmetric encryption, a single-key encryption technique, and asymmetric encryption, also known as public-key cryptography, which uses private- and public-key pairs …
Read Storyby Brett Daniel, on Jan 11, 2021 1:41:01 PM
Graphic: The SolarWinds hack shook American businesses and federal agencies in December. We're unpacking the hack in this blog post. Table of Contents What is the SolarWinds Hack? How did …
Read Storyby Brett Daniel, on Oct 26, 2020 3:38:08 PM
Graphic: Trenton Systems has partnered with leading cybersecurity solutions company FUTURA Cyber for FIPS 140-2 drive encryption key management. Lawrenceville, Georgia, Monday, Oct. 26, 2020 – – Trenton Systems, Inc, …
Read Storyby Brett Daniel, on Oct 13, 2020 9:00:00 AM
Graphic: Self-encrypting drives conforming to TCG Opal 2.0, AES, and FIPS 140-2 are in incredibly high demand right now, particularly for mission-critical applications requiring state-of-the-art cybersecurity solutions for sensitive or …
Read Storyby Kimberly Carter, on Aug 27, 2020 9:26:50 AM
Photo: Data at rest encryption and FIPS 140-2 compliance are often used as a measurement of a system's cybersecurity effectiveness. Cybersecurity. It’s the buzzword that keeps rearing its worrisome head …
Read StoryOur blogs cover the latest ruggedized computing news and company updates.