There are many different types of cyberthreats and possible targets. The perceived threat level of each potential attack dictates the amount of time and resources organizations are prepared to deploy to address the problem, but how can threat levels be defined and...
The term cryptography refers to the art and science of keeping data secret. Ever since writing was developed, people have tried to conceal the information it contained. According to the Encyclopedia Britannica, “Examples survive in stone inscriptions, cuneiform...
When most people in the USA hear terms like “Secret” or “Top Secret” regarding classified documents, they may assume that such classifications fall under the auspices of the National Security Agency (NSA) since the NSA plays a strong role in the nation’s...
As we publicly announced on Tuesday, our NIST-certified FIPS 140-2 L2 SSDs are entering the Common Criteria (CC) certification process. “Common Criteria” is shorthand for “Common Criteria for Information Technology Security Evaluation”. CC is a set of internationally...
Today, DIGISTOR had a set of announcements that bolster our leadership position in providing secure storage for Data At Rest (DAR), a huge concern for those who are chartered with protecting sensitive and classified data. We timed these announcements to coincide with...
Recent Comments