<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=235929&amp;fmt=gif">

by Christopher Trick, on Mar 17, 2022 1:57:36 PM

Memory attacks have quietly emerged as a new class of hacking techniques to undermine conventional security measures, posing a threat to all data that passes through a system. In this …

Read Story
Topics:IntelEncryptionmemoryTME

by Brett Daniel, on May 4, 2021 9:30:00 AM

Graphic: In this blog post, we discuss the differences between symmetric encryption, a single-key encryption technique, and asymmetric encryption, also known as public-key cryptography, which uses private- and public-key pairs …

Read Story
Topics:EncryptionSymmetric encryptionAsymmetric encryption

by Brett Daniel, on Jan 11, 2021 1:41:01 PM

Graphic: The SolarWinds hack shook American businesses and federal agencies in December. We're unpacking the hack in this blog post. Table of Contents What is the SolarWinds Hack? How did …

Read Story
Topics:CybersecurityFederal Information Processing Standards (FIPS)Encryption

by Brett Daniel, on Oct 26, 2020 3:38:08 PM

Graphic: Trenton Systems has partnered with leading cybersecurity solutions company FUTURA Cyber for FIPS 140-2 drive encryption key management. Lawrenceville, Georgia, Monday, Oct. 26, 2020 – – Trenton Systems, Inc, …

Read Story
Topics:Computer hardwareCybersecurityFederal Information Processing Standards (FIPS)PartnershipsEncryptionPress Release

by Brett Daniel, on Oct 13, 2020 9:00:00 AM

Graphic: Self-encrypting drives conforming to TCG Opal 2.0, AES, and FIPS 140-2 are in incredibly high demand right now, particularly for mission-critical applications requiring state-of-the-art cybersecurity solutions for sensitive or …

Read Story
Topics:CybersecurityFederal Information Processing Standards (FIPS)Controlled Unclassified Information (CUI)Encryption

by Kimberly Carter, on Aug 27, 2020 9:26:50 AM

Photo: Data at rest encryption and FIPS 140-2 compliance are often used as a measurement of a system's cybersecurity effectiveness. Cybersecurity. It’s the buzzword that keeps rearing its worrisome head …

Read Story
Topics:Defense Advanced Research Projects (DARP)CybersecurityFederal Information Processing Standards (FIPS)Encryption

Trenton Systems Blog

Our blogs cover the latest ruggedized computing news and company updates.

More...

Subscribe to Updates