<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=235929&amp;fmt=gif">

by Brett Daniel, on May 4, 2021 9:30:00 AM

Graphic: In this blog post, we discuss the differences between symmetric encryption, a single-key encryption technique, and asymmetric encryption, also known as public-key cryptography, which uses private- and public-key pairs …

Read Story
Topics:EncryptionSymmetric encryptionAsymmetric encryption

by Brett Daniel, on Mar 31, 2021 4:36:39 PM

Graphic: The Advanced Encryption Standard, or AES, is the modern gold standard for data encryption. We'll answer your frequently asked questions and tell you everything you need to know in …

Read Story
Topics:EncryptionAdvanced Encryption Standard (AES)AES encryption

by Brett Daniel, on Jan 11, 2021 1:41:01 PM

Graphic: The SolarWinds hack shook American businesses and federal agencies in December. We're unpacking the hack in this blog post. Table of Contents What is the SolarWinds Hack? How did …

Read Story
Topics:CybersecurityFederal Information Processing Standards (FIPS)Encryption

by Brett Daniel, on Oct 26, 2020 3:38:08 PM

Graphic: Trenton Systems has partnered with leading cybersecurity solutions company FUTURA Cyber for FIPS 140-2 drive encryption key management. Lawrenceville, Georgia, Monday, Oct. 26, 2020 – – Trenton Systems, Inc., a leading …

Read Story
Topics:Computer hardwareCybersecurityFederal Information Processing Standards (FIPS)PartnershipsEncryptionPress Release

by Brett Daniel, on Oct 13, 2020 9:00:00 AM

Graphic: Self-encrypting drives conforming to TCG Opal 2.0, AES, and FIPS 140-2 are in incredibly high demand right now, particularly for mission-critical applications requiring state-of-the-art cybersecurity solutions for sensitive or …

Read Story
Topics:CybersecurityFederal Information Processing Standards (FIPS)Controlled Unclassified Information (CUI)Encryption

by Kimberly Carter, on Aug 27, 2020 9:26:50 AM

Photo: Data at rest encryption and FIPS 140-2 compliance are often used as a measurement of a system's cybersecurity effectiveness. Cybersecurity. It’s the buzzword that keeps rearing its worrisome head …

Read Story
Topics:Defense Advanced Research Projects (DARP)CybersecurityFederal Information Processing Standards (FIPS)Encryption

Trenton Systems Blog

Our blogs cover the latest ruggedized computing news and company updates.

More...

Subscribe to Updates