We live in a digitally turbulent world. Data is continuously created, stored, analyzed—and coveted. Especially surveillance data obtained by unmanned aerial vehicles (UAVs). Accordingly, the U.S. military goes to great lengths to protect data stored in UAVs, as well...
Previous blogs highlighted headline-making cyberattacks. Of course, there’s the infamous 2020 SolarWinds attack: the Russian Foreign Intelligence Service injected malicious code into network management software, infecting thousands of users in federal agencies like...
Today, we’ve announced our commercial-class PCIe Gen 4 SSDs. These M.2 format NVMe SSDs have four PCIe lanes (so we often refer to these as Gen 4×4) and are more than twice as fast as our PCIe Gen 3×4 SSDs. You can get the most out of your high-speed...
Last week, I ran across a column by CNN’s Sean Lyngaas called Hackers Have Breached Organizations in Defense and Other Sensitive Sectors. Security firm Palo Alto Networks recently discovered that suspected foreign hackers have breached nine organizations in the...
When selecting a solid-state drive (SSD) for your computer, many people begin by estimating how much data storage capacity they’ll need over the lifetime of their computer. SSDs typically range from 128GB to 2TB with 4TB becoming common and even 8TB devices are...
There are many different types of cyberthreats and possible targets. The perceived threat level of each potential attack dictates the amount of time and resources organizations are prepared to deploy to address the problem, but how can threat levels be defined and...
The term cryptography refers to the art and science of keeping data secret. Ever since writing was developed, people have tried to conceal the information it contained. According to the Encyclopedia Britannica, “Examples survive in stone inscriptions, cuneiform...
When most people in the USA hear terms like “Secret” or “Top Secret” regarding classified documents, they may assume that such classifications fall under the auspices of the National Security Agency (NSA) since the NSA plays a strong role in the nation’s...
As we publicly announced on Tuesday, our NIST-certified FIPS 140-2 L2 SSDs are entering the Common Criteria (CC) certification process. “Common Criteria” is shorthand for “Common Criteria for Information Technology Security Evaluation”. CC is a set of internationally...
Today, DIGISTOR had a set of announcements that bolster our leadership position in providing secure storage for Data At Rest (DAR), a huge concern for those who are chartered with protecting sensitive and classified data. We timed these announcements to coincide with...
Recent Comments