Absolutely Nothin’

Absolutely Nothin’

As with most things in life, there are many facets to cybersecurity. Why protecting data is important, how data security is created and maintained, what information needs to be protected to what standards, how cybersecurity is its own arms race, and so on. Of course,...
How Our Customers Use Our SSDs

How Our Customers Use Our SSDs

When I started writing this blog, I planned to talk only about a few use cases for self-encrypting solid-state drives (SSDs) we’ve been seeing. But the mind wandered… Later, we’ll take a detour onto the path of SSD and storage history. (Not only do I wander down...
Will We See You at WEST 2022?

Will We See You at WEST 2022?

Now in its 32nd year, the WEST Conference and Exposition is the premier naval event to be held on the North American West Coast. WEST’s mission is to bring the military and industry together to explore current and future platforms and technologies. As part of this,...
Humans Aren’t Built for Security

Humans Aren’t Built for Security

It’s so easy to become so focused on something that we can’t see the forest for the trees. As a hiker/backpacker/climber, I experience the literal version of that phrase quite often. In the world of cybersecurity, we spend a lot of time worrying about sophisticated...
Securely Erasing SSDs

Securely Erasing SSDs

We speak often of securing data at rest (DAR) since it’s important to our customers. Secure DAR solutions call for equipping an SSD with a hardware encryption engine (EE). This self-encrypting drive (SED) automatically encrypts any data as it’s written to the...