DIGISTOR Digest
Securing Data at Rest
Ultimate in DAR Security: DIGISTOR FIPS SSDs are CSfC Listed
We’ve achieved another important listing with our DIGISTOR FIPS self-encrypting drives! The National Security Agency (NSA) has placed our DIGISTOR FIPS 140-2 L2 SSDs on the Commercial Solutions for Classified (CSfC) component list as a Hardware Full Drive Encryption...
DIGISTOR® Secure Data Storage has Changed the Game in Securing Government Data at Rest
DIGISTOR now has the world's first FIPS SATA and PCIe/NVMe SSDs at COTS pricing listed on the National Information Assurance Partnership (NIAP) Product Compliant List. In this blog, you'll learn why that's significant and how our FIPS SSDs can now be used to secure...
Plans to Protect Our Energy Grid from Cybersecurity Threats
The 2015 cyberattack on Ukraine’s energy grid that caused power outages for nearly a quarter million people was once the most devastating and best-known. Since then, there have been many successful power grid attacks in the United States. In addition to successful...
Challenges of Moving Data in an Air-Gapped Network
Moving data in an air-gapped network can be difficult due to the intensive protocols required to protect sensitive data during transit. As we note in a previous post, an air gapped computer or air-gapped network is one that has been siloed from others. Air-gapping...
Common Security Breaches and How to Address Them
Security breaches are a major issue in the digital age. With access to information and data stored on computers, drives, and other digital media, those with malicious intent can take advantage of unsuspecting users and businesses. Sadly, most small businesses would...
Zero Trust: What Business Leaders Should Know About the Security Framework
Instances of cyber attacks are on the rise, targeting companies at an increase of 38 percent in 2022 compared to the number of attacks in 2021. Businesses of all sizes are vulnerable, and many are turning to the “zero trust” architecture model to improve their...
Data Security Trends We’ll See in 2023
From the war in Ukraine and accelerating global inflation to ongoing supply chain issues and a looming recession, 2022 was an eventful year. As we know from monitoring data security trends, breaches, and attacks, last year was particularly momentous from a...
What Happens to a Company’s Reputation After a Data Breach?
As we noted in our last post “The Hidden Costs of a Data Breach,” one major data breach impact is lost revenue. Lost business can result from the reputational damage that occurs in the wake of a data breach. In our recent post, we referenced a Harris Poll survey...
The Horrible Hidden Costs of a Data Breach
Both small family-owned businesses and the world's largest companies are at risk of ransomware, malware, phishing and other attacks. Depending on the extent of the breach and the type of information stolen, the cost of a data breach can exceed millions of dollars....