Data Encryption Illustration


STATES: The Encryption Wars. Although the Federal Bureau of Investigation’s (FBI) dispute with Apple dominated the news for months this spring, the real encryption war may only now be simmering, as states battle the federal government over the right to regulate encryption. Recently, some states have proposed legislation that aims to require decryption, while members of Congress have started to propose federal solutions that would directly oppose such state legislation. Read more

VIDEO: Apple CEO Tim Cook Refuses to Bypass Encryption on iPhone For FBI and Federal Government. Apple (APPL) CEO Tim Cook refuses to allow the United States Federal Government and the FBI to gain a “backdoor” to iOS in their attempt to hack into the cellphone of the San Bernardino terrorists, who attacked a Christmas Holiday party in December of 2015, killing 14 people. The Federal Government, via US Magistrate Sheri Pym, ordered Apple to provide the necessary information to crack the cellphone on Tuesday, February 16, 2016. Many see this case as yet another battle in the constant war of security vs. privacy in the United States. Some say that security should be tantamount to American patriotism, and that it should be upheld at all costs, above all (über alles) as Donald Trump said. There are others, such as former CIA employee Eric Snowden, who say that privacy should not be sacrificed in the name of security, because at a certain point, it becomes domestic spying. Find out more

PODCAST: Thwarting Attempts to Defeat Encryption in POS Devices. Exclusive, insightful audio interviews by Government Info Security staff with government/security leading practitioners and thought-leaders. Find out more

READ: Encryption Policy in the Modern Age: A Not So Simple Debate. Stanford University researchers shared the fruits and frustrations of their efforts to clarify the government’s current practices around the encryption of electronic devices during a Crypto Policy Project event Nov. 2. Read the rest


NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems October 2016

IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.

BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.


Encryption – Daily Tech Update – November 15, 2016

Leave a Reply