by Christopher Trick, on Oct 12, 2022 3:12:44 PM
With advanced cyberattacks on the rise, technology that handles and encrypts critical data must be secure and reliable at all times, at all levels. In this blog, you'll learn more …
Read Storyby Brett Daniel, on Apr 22, 2021 4:20:12 PM
Graphic: The official name for FIPS 140-2 is "Security Requirements for Cryptographic Modules." Table of Contents What is FIPS 140-2? What does it mean to be compliant with FIPS 140-2? …
Read Storyby Brett Daniel, on Jan 11, 2021 1:41:01 PM
Graphic: The SolarWinds hack shook American businesses and federal agencies in December. We're unpacking the hack in this blog post. Table of Contents What is the SolarWinds Hack? How did …
Read Storyby Brett Daniel, on Oct 26, 2020 3:38:08 PM
Graphic: Trenton Systems has partnered with leading cybersecurity solutions company FUTURA Cyber for FIPS 140-2 drive encryption key management. Lawrenceville, Georgia, Monday, Oct. 26, 2020 – – Trenton Systems, Inc, …
Read Storyby Brett Daniel, on Oct 13, 2020 9:00:00 AM
Graphic: Self-encrypting drives conforming to TCG Opal 2.0, AES, and FIPS 140-2 are in incredibly high demand right now, particularly for mission-critical applications requiring state-of-the-art cybersecurity solutions for sensitive or …
Read Storyby Kimberly Carter, on Aug 27, 2020 9:26:50 AM
Photo: Data at rest encryption and FIPS 140-2 compliance are often used as a measurement of a system's cybersecurity effectiveness. Cybersecurity. It’s the buzzword that keeps rearing its worrisome head …
Read StoryOur blogs cover the latest ruggedized computing news and company updates.