<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=235929&amp;fmt=gif">

Blogs by Trenton Systems / Cybersecurity (3)

Is Edge Computing Secure? Here Are 4 Security Risks to Be Aware Of

An illustration of an edge computing network

Graphic: Like any new computing paradigm, edge computing brings with it some significant security risks to be aware of. Every new widely adopted computing technology begets a corresponding learning curve for businesses and organizations. With cloud computing, this involved adapting to …

Read Story

Trenton Systems partners with FUTURA Cyber for FIPS drive management

Trenton Systems partners with FUTURA Cyber

Graphic: Trenton Systems has partnered with leading cybersecurity solutions company FUTURA Cyber for FIPS 140-2 drive encryption key management. Lawrenceville, Georgia, Monday, Oct. 26, 2020 – – Trenton Systems, Inc., a leading designer and manufacturer of ruggedized, cybersecure, mad …

Read Story

Your All-in-One Guide to Self-Encrypting Drives (SEDs)

A graphic showing binary code layered over a hard drive

Table of Contents What is a self-encrypting drive (SED)? Where can I find self-encrypting drives? How do self-encrypting drives work? Are self-encrypting drives secure? How do I know if my drive is self-encrypting? What level of encryption do self-encrypting drives provide? What's the …

Read Story

Trenton Systems partners with Star Lab to provide cybersecure systems

Trenton Systems partners with Star Lab to provide cybersecure systems

Graphic: Trenton Systems and Star Lab are joining forces to develop ruggedized, fully hardened military computers for mission-critical defense systems. Lawrenceville, Georgia, Monday, September 14, 2020 – Computer hardware manufacturer Trenton Systems is joining forces with security s …

Read Story

Cybersecurity, Data-at-Rest Encryption, and FIPS 140-2

Cybersecurity. It’s the buzzword that keeps rearing its worrisome head in technology-related meetings across the globe. We can chat about COTS and custom rugged computers all day, but why progress any further if cybersecurity isn't a part of the discussion from the very beginning? Unf …

Read Story

Subscribe by email