<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=235929&amp;fmt=gif">

Blogs by Trenton Systems / Federal Information Processing Standards (FIPS)

What is FIPS 140-3?

What is FIPS 140-3?

With advanced cyberattacks on the rise, technology that handles and encrypts critical data must be secure and reliable at all times, at all levels. In this blog, you'll learn more about FIPS 140-3, why it's important, and how it differs from FIPS 140-2 to enhance protection of data-at …

Read Story

What Is FIPS 140-2?

A custom cryptographic padlock symbolizing FIPS 140-2 encryption

Graphic: The official name for FIPS 140-2 is "Security Requirements for Cryptographic Modules." Table of Contents What is FIPS 140-2? What does it mean to be compliant with FIPS 140-2? How do FIPS 140-2 levels work? How do you become compliant with FIPS 140-2? What algorithms are comp …

Read Story

The SolarWinds Orion Hack Explained

A SolarWinds app displayed on a cellphone with a background that reads

Read Story

Trenton Systems partners with FUTURA Cyber for FIPS drive management

Trenton Systems partners with FUTURA Cyber

Graphic: Trenton Systems has partnered with leading cybersecurity solutions company FUTURA Cyber for FIPS 140-2 drive encryption key management. Lawrenceville, Georgia, Monday, Oct. 26, 2020 – – Trenton Systems, Inc., a leading designer and manufacturer of ruggedized, cybersecure, mad …

Read Story

Your All-in-One Guide to Self-Encrypting Drives (SEDs)

A graphic showing binary code layered over a hard drive

Table of Contents What is a self-encrypting drive (SED)? Where can I find self-encrypting drives? How do self-encrypting drives work? Are self-encrypting drives secure? How do I know if my drive is self-encrypting? What level of encryption do self-encrypting drives provide? What's the …

Read Story

Cybersecurity, Data-at-Rest Encryption, and FIPS 140-2

Cybersecurity. It’s the buzzword that keeps rearing its worrisome head in technology-related meetings across the globe. We can chat about COTS and custom rugged computers all day, but why progress any further if cybersecurity isn't a part of the discussion from the very beginning? Unf …

Read Story

Subscribe by email