DIGISTOR Digest
Securing Data at Rest
How to Choose the Right Data Storage for Your Application
In our latest post, we described key differences between standard, industrial, and enterprise-class SSDs. SSD form factors, performance in extreme conditions, the number of DWPDs (drive writes per day) under warranty, the length of the drive’s warranty, and advanced...
With CSfC Listing, There’s No Cyber Waiver for Storage Needed Here!
Back in the early aughts, the NSA created a program called CSfC – or Commercial Solutions for Classified. As we explain in our post “Innovation, Integrity & Affordability: Why CSfC Matters,” this program “allows commercial off-the-shelf technology to be used in...
Why It Matters: Secure Data Storage Solutions in the Military
With cyber threats ever increasing in number and complexity, the importance of secure data storage in the military and federal agencies cannot be overstated. Advancements in technology and an increasing dependence on digital systems have made it easier for hackers to...
Why Are Air Gaps Important When Securing Data?
In today's world of constant cyber threats, protecting sensitive information from bad actors is more important than ever. One method used to secure data is the implementation of air gaps. Simply put, an air gap is a physical disconnect between two networks or devices....
The Devastating Consequences of a Data Breach
When a data breach occurs, an organization loses more than just money. There are many other consequences as a result. Data breaches can also result in damage to an organization's reputation once clients learn that personally identifiable information has been...
Innovation, Integrity & Affordability: Why CSfC Matters
CSfC, or Commercial Solutions for Classified, is a program established by the National Security Agency (NSA). This program allows commercial off-the-shelf technology to be used in secure government communications. CSfC empowers government agencies to use products from...
The Critical Role of Secure Storage in ISR
One cannot understate the critical role of secure storage in ISR (Intelligence, Surveillance, and Reconnaissance). It ensures the success of military operations by safeguarding sensitive data collected through surveillance and reconnaissance activities. Implementing...
What is Pre-Boot Authentication, and Why Should I Care?
Multi-step authentication processes protect devices and the data stored within from being compromised, stolen, and disseminated by bad actors. Pre-boot authentication—which requires users to authenticate before booting up their device—is part of a layered approach to...
Message from CDSG: Here’s What We’re Seeing in Data Security
Since announcing our CSfC listings, we have experienced a deluge of interest. Private companies, government contractors, members of the military, and many other parties have contacted our team. This not only highlights the importance of CSfC validation but also a...