What is Intel TME (Total Memory Encryption)?
by Christopher Trick on Mar 17, 2022 1:57:36 PM
Memory attacks have quietly emerged as a new class of hacking techniques to undermine conventional security measures, posing a threat to all data that passes through a system. In this blog, you'll learn how Intel TME (Total Memory Encryption) acts as a necessary safeguard for protecti …
Symmetric vs. Asymmetric Encryption: What's the Difference?
by Brett Daniel on May 4, 2021 9:30:00 AM
Graphic: In this blog post, we discuss the differences between symmetric encryption, a single-key encryption technique, and asymmetric encryption, also known as public-key cryptography, which uses private- and public-key pairs of encryption keys. To transmit a key or not to transmit a …
Trenton Systems partners with FUTURA Cyber for FIPS drive management
by Brett Daniel on Oct 26, 2020 3:38:08 PM
Graphic: Trenton Systems has partnered with leading cybersecurity solutions company FUTURA Cyber for FIPS 140-2 drive encryption key management. Lawrenceville, Georgia, Monday, Oct. 26, 2020 – – Trenton Systems, Inc., a leading designer and manufacturer of ruggedized, cybersecure, mad …
Your All-in-One Guide to Self-Encrypting Drives (SEDs)
by Brett Daniel on Oct 13, 2020 9:00:00 AM
Table of Contents What is a self-encrypting drive (SED)? Where can I find self-encrypting drives? How do self-encrypting drives work? Are self-encrypting drives secure? How do I know if my drive is self-encrypting? What level of encryption do self-encrypting drives provide? What's the …
Cybersecurity, Data-at-Rest Encryption, and FIPS 140-2
by Kimberly Carter on Aug 27, 2020 9:26:50 AM
Cybersecurity. It’s the buzzword that keeps rearing its worrisome head in technology-related meetings across the globe. We can chat about COTS and custom rugged computers all day, but why progress any further if cybersecurity isn't a part of the discussion from the very beginning? Unf …