have promoted awareness of cybersecurity best practices. CISA acknowledges that cybersecurity is a collaborative effort between private companies, government agencies, and individual citizens. To increase cybersecurity awareness and ensure we all protect ourselves...
Securing data at rest (DAR) is top of mind for security officers and IT departments. Ransomware, malware, and other cyber attacks can be protected in many ways, including what is known as an air gap or air-gapped network. But what is an air-gapped network? In an...
DIGISTOR FIPS 140-2 L2 certified self-encrypting drives (SEDs) are now available with Common Criteria certification (in process). The need for an additional level of assurance for encrypting and protecting Data at Rest (DAR) has never been higher for those in...
Last week, I ran across a column by CNN’s Sean Lyngaas called Hackers Have Breached Organizations in Defense and Other Sensitive Sectors. Security firm Palo Alto Networks recently discovered that suspected foreign hackers have breached nine organizations in the...
The term cryptography refers to the art and science of keeping data secret. Ever since writing was developed, people have tried to conceal the information it contained. According to the Encyclopedia Britannica, “Examples survive in stone inscriptions, cuneiform...
When most people in the USA hear terms like “Secret” or “Top Secret” regarding classified documents, they may assume that such classifications fall under the auspices of the National Security Agency (NSA) since the NSA plays a strong role in the nation’s...
Recent Comments