DIGISTOR Digest
Securing Data at Rest
Citadel SSDs: Protecting Data Begins with Securing Your Devices
Recent years have seen a surge in sophisticated cyber-attacks—with perpetrators relentlessly attempting to exploit any potential weakness in our systems. As businesses and individuals transmit vast quantities of information daily, the vulnerability of software...
Securing Data in a Zero Trust Environment
Data is the center of everything. Initially rooted in basic digital protections and physical barriers, data security has since evolved in response to an escalating complexity of cyber threats. Central to this evolution is the emergence of the "zero trust" environment....
Secure Our World: Cybersecurity Awareness Month 2023
Every year since 2004, CISA (Homeland Security’s Cybersecurity & Infrastructure Security Agency) and the National Cybersecurity Alliance have promoted awareness of cybersecurity best practices. CISA acknowledges that cybersecurity is a collaborative effort between...
What’s the Difference Between Standard, Industrial, and Enterprise Data Storage?
Standard, industrial, and enterprise-class drives are different classes of hard disk drives (HDDs) or solid-state drives (SSDs)—each designed for specific use cases and environments. Under the conditions for which they were created, users can expect reliable...
Key Takeaways from the Recent LastPass Cybersecurity Breaches
Our federal government has repeatedly pointed to data breaches as a serious matter of national security, given the wide-ranging impacts attacks can have on our shared infrastructure, private companies, and individual consumers. Despite increased attention on...
How to Choose the Right Data Storage for Your Application
In our latest post, we described key differences between standard, industrial, and enterprise-class SSDs. SSD form factors, performance in extreme conditions, the number of DWPDs (drive writes per day) under warranty, the length of the drive’s warranty, and advanced...
With CSfC Listing, There’s No Cyber Waiver for Storage Needed Here!
Back in the early aughts, the NSA created a program called CSfC – or Commercial Solutions for Classified. As we explain in our post “Innovation, Integrity & Affordability: Why CSfC Matters,” this program “allows commercial off-the-shelf technology to be used in...
Why It Matters: Secure Data Storage Solutions in the Military
With cyber threats ever increasing in number and complexity, the importance of secure data storage in the military and federal agencies cannot be overstated. Advancements in technology and an increasing dependence on digital systems have made it easier for hackers to...
Why Are Air Gaps Important When Securing Data?
In today's world of constant cyber threats, protecting sensitive information from bad actors is more important than ever. One method used to secure data is the implementation of air gaps. Simply put, an air gap is a physical disconnect between two networks or devices....