We’ve achieved another important listing with our DIGISTOR FIPS self-encrypting drives! The National Security Agency (NSA) has placed our DIGISTOR FIPS 140-2 L2 SSDs on the Commercial Solutions for Classified (CSfC) component list as a Hardware Full Drive Encryption...
DIGISTOR now has the world’s first FIPS SATA and PCIe/NVMe SSDs at COTS pricing listed on the National Information Assurance Partnership (NIAP) Product Compliant List. In this blog, you’ll learn why that’s significant and how our FIPS SSDs can now be...
The 2015 cyberattack on Ukraine’s energy grid that caused power outages for nearly a quarter million people was once the most devastating and best-known. Since then, there have been many successful power grid attacks in the United States. In addition to successful...
Moving data in an air-gapped network can be difficult due to the intensive protocols required to protect sensitive data during transit. As we note in a previous post, an air gapped computer or air-gapped network is one that has been siloed from others. Air-gapping...
Security breaches are a major issue in the digital age. With access to information and data stored on computers, drives, and other digital media, those with malicious intent can take advantage of unsuspecting users and businesses. Sadly, most small businesses would...
Instances of cyber attacks are on the rise, targeting companies at an increase of 38 percent in 2022 compared to the number of attacks in 2021. Businesses of all sizes are vulnerable, and many are turning to the “zero trust” architecture model to improve their...
From the war in Ukraine and accelerating global inflation to ongoing supply chain issues and a looming recession, 2022 was an eventful year. As we know from monitoring data security trends, breaches, and attacks, last year was particularly momentous from a...
As we noted in our last post “The Hidden Costs of a Data Breach,” one major data breach impact is lost revenue. Lost business can result from the reputational damage that occurs in the wake of a data breach. In our recent post, we referenced a Harris Poll survey...
Both small family-owned businesses and the world’s largest companies are at risk of ransomware, malware, phishing and other attacks. Depending on the extent of the breach and the type of information stolen, the cost of a data breach can exceed millions of...
Securing data at rest (DAR) is top of mind for security officers and IT departments. Ransomware, malware, and other cyber attacks can be protected in many ways, including what is known as an air gap or air-gapped network. But what is an air-gapped network? In an...
Recent Comments