DIGISTOR Digest

Securing Data at Rest

Is BitLocker Sufficient?

Is BitLocker Sufficient?

Microsoft Windows includes a software encryption feature called BitLocker. BitLocker is designed to protect data by encrypting entire storage volumes. A volume, or logical drive, is a single storage area that has a single file system. By default, BitLocker uses the...

read more
Pentagon Creates ‘Zero Trust’ Cybersecurity Office

Pentagon Creates ‘Zero Trust’ Cybersecurity Office

Previous blogs highlighted headline-making cyberattacks. Of course, there’s the infamous 2020 SolarWinds attack: the Russian Foreign Intelligence Service injected malicious code into network management software, infecting thousands of users in federal agencies like...

read more
Introducing DIGISTOR PCIe Gen 4 SSDs

Introducing DIGISTOR PCIe Gen 4 SSDs

Today, we’ve announced our commercial-class PCIe Gen 4 SSDs. These M.2 format NVMe SSDs have four PCIe lanes (so we often refer to these as Gen 4x4) and are more than twice as fast as our PCIe Gen 3x4 SSDs. You can get the most out of your high-speed applications that...

read more
CISOs: Maintaining Cybersecurity at a Global Scale

CISOs: Maintaining Cybersecurity at a Global Scale

Last week, I ran across a column by CNN’s Sean Lyngaas called Hackers Have Breached Organizations in Defense and Other Sensitive Sectors. Security firm Palo Alto Networks recently discovered that suspected foreign hackers have breached nine organizations in the...

read more
It’s All About Speed: PCIe Gen 4

It’s All About Speed: PCIe Gen 4

When selecting a solid-state drive (SSD) for your computer, many people begin by estimating how much data storage capacity they’ll need over the lifetime of their computer.  SSDs typically range from 128GB to 2TB  with 4TB becoming common and even 8TB devices are...

read more
Cybersecurity Threat Levels: What Do You Know?

Cybersecurity Threat Levels: What Do You Know?

There are many different types of cyberthreats and possible targets. The perceived threat level of each potential attack dictates the amount of time and resources organizations are prepared to deploy to address the problem, but how can threat levels be defined and...

read more
An Overview of Encryption Standards and Technologies

An Overview of Encryption Standards and Technologies

The term cryptography refers to the art and science of keeping data secret. Ever since writing was developed, people have tried to conceal the information it contained. According to the Encyclopedia Britannica, “Examples survive in stone inscriptions, cuneiform...

read more