Data Encryption Illustration


FUTURE: Three Touchy Questions for Tech Leaders to Ask Trump. The incoming administration will inherit contentious policy debates about cybersecurity, privacy, and Internet regulation. Read more

SECURITY: This App Wants to Be Your Encrypted, Self-Destructing Slack. If you use a workplace collaboration tool like Slack or Hipchat, it’s easy to fall into an assumption of privacy, throwing around gossip and even sensitive business as if it were normal cubicle chatter. It’s not. Anything you write in one of those collaborative chatrooms can be stored, and is potentially vulnerable to government surveillance, hacking, or a subpoena in a run-of-the-mill lawsuit. The encrypted-messaging startup Wickr wants to solve that potential Slack-snooping problem. Find out more

TWITTER: Are Encrypted Direct Messages Coming to Twitter? Following his chat with whistleblower Edward Snowden, @Jack dropped a hint about what privacy features might be in the cards for Twitter. In the tweeted exchange, Dorsey and Snowden continued the conversation that streamed on Periscope Tuesday, veering back to the topic of Twitter itself. When Snowden asked if Twitter might consider making the platform’s private messages more secure in some way, Dorsey left the door open for a major security tweak. Find out more

OPINION: Mandate Encryption for All Devices. In today’s ever-connected society, the need for strong, mandatory encryption for all devices is more important than ever. Current events have shown us the dangers which an unencrypted society faces – from losses of personal information to leaking critical vulnerabilities in our nation’s infrastructure. If the federal government wants to ensure a greater degree of safety (and privacy) for its civilians, it should reverse its stance on encryption and learn to embrace it as a valuable security tool. Read the rest


NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems November 2016

IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.

BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.


Encryption – Daily Tech Update – December 16, 2016

Leave a Reply