<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=235929&amp;fmt=gif">

Blogs by Trenton Systems / Federal Information Processing Standards (FIPS)

by Christopher Trick, on Oct 12, 2022 3:12:44 PM

With advanced cyberattacks on the rise, technology that handles and encrypts critical data must be secure and reliable at all times, at all levels. In this blog, you'll learn more …

Read Story
Topics:CybersecurityFederal Information Processing Standards (FIPS)self-encrypting drives (SEDs)FIPS 140-3

by Brett Daniel, on Apr 22, 2021 4:20:12 PM

Graphic: The official name for FIPS 140-2 is "Security Requirements for Cryptographic Modules." Table of Contents What is FIPS 140-2? What does it mean to be compliant with FIPS 140-2? …

Read Story
Topics:Federal Information Processing Standards (FIPS)FIPS 140-2

by Brett Daniel, on Jan 11, 2021 1:41:01 PM

Graphic: The SolarWinds hack shook American businesses and federal agencies in December. We're unpacking the hack in this blog post. Table of Contents What is the SolarWinds Hack? How did …

Read Story
Topics:CybersecurityFederal Information Processing Standards (FIPS)Encryption

by Brett Daniel, on Oct 26, 2020 3:38:08 PM

Graphic: Trenton Systems has partnered with leading cybersecurity solutions company FUTURA Cyber for FIPS 140-2 drive encryption key management. Lawrenceville, Georgia, Monday, Oct. 26, 2020 – – Trenton Systems, Inc, …

Read Story
Topics:Computer hardwareCybersecurityFederal Information Processing Standards (FIPS)PartnershipsEncryptionPress Release

by Brett Daniel, on Oct 13, 2020 9:00:00 AM

Graphic: Self-encrypting drives conforming to TCG Opal 2.0, AES, and FIPS 140-2 are in incredibly high demand right now, particularly for mission-critical applications requiring state-of-the-art cybersecurity solutions for sensitive or …

Read Story
Topics:CybersecurityFederal Information Processing Standards (FIPS)Controlled Unclassified Information (CUI)Encryption

by Kimberly Carter, on Aug 27, 2020 9:26:50 AM

Photo: Data at rest encryption and FIPS 140-2 compliance are often used as a measurement of a system's cybersecurity effectiveness. Cybersecurity. It’s the buzzword that keeps rearing its worrisome head …

Read Story
Topics:Defense Advanced Research Projects (DARP)CybersecurityFederal Information Processing Standards (FIPS)Encryption

Trenton Systems Blog

Our blogs cover the latest ruggedized computing news and company updates.

More...

Subscribe to Updates