Digital key in pixeled keyholeENCRYPTION

INDUSTRY INSIGHT: Using Encryption to Help Fight Data Breaches. With increasingly porous networks and expanding use of cloud resources, traditional endpoint and network security are no longer sufficient. When implemented as a part of the initial development, data security — most especially, encryption — offers increased protection to known and unknown sensitive data in advanced technology environments. Read more
[GCN.COM]

ID MANAGEMENT: What If Your Data Could Secure Itself? While the government manages and secures large, complex and often outdated legacy IT systems, as federal agencies modernize their IT, it is possible to harden systems from the inside out by encrypting and anonymizing data to minimize the potential for loss when an adversary invades. Read more
[NEXTGOV.COM]

HOW: The US Government Secretly Sold ‘Spy Phones’ to Suspects. In 2010, a suspected cocaine smuggler named John Krokos bought encrypted BlackBerry devices from an undercover Drug Enforcement Administration agent. That sort of federal subterfuge is par for the course. But in this case, the DEA held onto the encryption keys—meaning that when the government moved on Krokos and his alleged collaborators a few years later, they could read the emails and messages that passed to and from the phone. Read more
[WIRED.COM]

SECURITY: PGP Encryption Won’t Protect Your Data. But PURBs Can. You may think that encrypting your sensitive files with, say, PGP may protect your data – but you’d be wrong. Most encryption formats leak a lot of plaintext metadata, and that’s a problem. Here’s what you need to know. Read more
[ZDNET.COM]

==========

NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems June 2018 https://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-june-2018.

IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.

BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.

==========

Encryption – Daily Tech Update – July 18, 2018

Leave a Reply