Protecting Your Data - All You Never Wanted to Know about FIPS 140-2

Warning! This blog starts out with some techy jargon but it’s well worth your time if you have data that needs to be secured. I promise this blog has a business focus. “Security requirements for cryptographic modules.” That’s the official title of the Federal Information Processing Standards Publication 140-2, otherwise known as FIPS 140-2. This US Government standard specifies the security requirements that will be satisfied by a cryptographic module utilized within a security system protecting sensitive but unclassified information. It was written for the government and any organization doing business with the government, and businesses have adopted it as a computing standard regardless of government interaction. Wait! Don’t stop reading.

Read More

About this Blog


How can you leverage The Cloud? How will you get there? What will protect you from disaster? Your cloud journey can start anywhere and evolve. CloudSAFE can help you no matter where you start or where you want to go.

Everyone says you need to be in The Cloud. But why? And how? CloudSAFE can help you determine what that means to your company and the best way to get there. The Cloud can be a powerful tool. It provides flexibility, security, capacity and it’s cost effective, enabling you to avoid capital investment. But the question remains, what is right for your company? Contrary to popular opinion, The Cloud is not one size fits all. CloudSAFE has a broad range of solutions and services focused on IT Business Continuity and Infrastructure as a Service.

CloudSAFE believes The Cloud is not “One Size Fits All”. Follow us on our blog and see what else we believe in, and be sure to share your feedback with us.

Subscribe to Email Updates

Recent Posts