DIGISTOR Digest

Securing Data at Rest

DIGISTOR FIPS-Certified SEDs in Formal CC Testing

Great news for Data at Rest (DAR) security solution developers and customers! DIGISTOR has reached another milestone on the journey to obtaining Common Criteria certification and NIAP listing for all of our FIPS 140-2 L2 certified SSDs. DIGISTOR has recently received...

read more
Multi-Factor Authentication: Use It!

Multi-Factor Authentication: Use It!

The three commodities precious to most of us include our time, money, and personal information or data. Of course, these are all intertwined. Whether someone encrypts and ransoms our data, or if they simply corrupt or delete it, the result costs us. And if an...

read more
Raising the Bar with FIPS + Common Criteria (CC) SEDs

Raising the Bar with FIPS + Common Criteria (CC) SEDs

When it comes to self-encrypting drives (SEDs), SSDs that automatically perform encryption and decryption as data moves to and from the drive, a buyer should take into account certain considerations. A secure drive should include pre-boot authentication (PBA), which...

read more
DIGISTOR FIPS SEDs–Now With Common Criteria (CC)!

DIGISTOR FIPS SEDs–Now With Common Criteria (CC)!

DIGISTOR FIPS 140-2 L2 certified self-encrypting drives (SEDs) are now available with Common Criteria certification (in process). The need for an additional level of assurance for encrypting and protecting Data at Rest (DAR) has never been higher for those in...

read more
Cyberattacks Redux

Cyberattacks Redux

Cyber threats have been in the news a lot since Russia began its war with Ukraine. It's hard to paint this as good news—the war is awful. But most of us are generally complacent about the possibility of cyberattacks. So maybe being a constant part of the news cycle...

read more
Absolutely Nothin’

Absolutely Nothin’

As with most things in life, there are many facets to cybersecurity. Why protecting data is important, how data security is created and maintained, what information needs to be protected to what standards, how cybersecurity is its own arms race, and so on. Of course,...

read more
How Our Customers Use Our SSDs

How Our Customers Use Our SSDs

When I started writing this blog, I planned to talk only about a few use cases for self-encrypting solid-state drives (SSDs) we’ve been seeing. But the mind wandered… Later, we’ll take a detour onto the path of SSD and storage history. (Not only do I wander down...

read more