Military Embedded Systems

CDSG

Articles 1 - 1
Cyber

GUEST BLOG: Five steps to take when securing your data with multi-factor authentication - Blog

September 06, 2022

Computer data exists in different states at different times: data in transit (information flowing through a network); data in use (active data that is being accessed and manipulated by a computer program); and data-at-rest, known as DAR, or data that is physically housed in a storage device like a solid-state drive. Many cybersecurity solutions focus on securing data in transit and data in use, but neglect securing DAR.

Articles 1 - 1