Digital key in pixeled keyholeENCRYPTION

INDUSTRY INSIGHT: Encryption Management in Government Hyperconverged IT Networks. Hyperconvergence is becoming more widely accepted in government IT infrastructure, with agencies like the Department of State and the Government Accountability Office moving to the solution. A hyperconverged infrastructure (HCI) enables organizations to scale IT in the cloud while maintaining the performance, reliability and availability of an on-premises data center. It combines storage, compute, networking and a hypervisor into a single solution for a fully functional data center. But it’s not without its particular set of problems – for example, ensuring that sensitive data is properly encrypted and encryption keys are appropriately managed. Read more
[GCN.COM]

CHECK YOUR PC: A Decade-Old Attack Can Break the Encryption of Most PCs. If you want to secure the data on your computer, one of the most important steps you can take is encrypting its hard drive. That way, if your laptop gets lost or stolen—or someone can get to it when you’re not around—everything remains protected and inaccessible. But researchers at the security firm F-Secure have uncovered an attack that uses a decade-old technique, which defenders thought they had stymied, to expose those encryption keys, allowing a hacker to decrypt your data. Worst of all, it works on almost any computer. Read more
[WIRED.COM]

RANSOMWARE: The Bad Type of Encryption. Ransomware is one of the greatest threats to cybersecurity today. It’s grown in power as more people keep their sensitive data on their computers, too. That data is a prime target for hackers, especially if it’s not protected or backed up. Read more
[CLOUDWARDS.NET]

SECURITY: Flaw Can Leak Intel ME Encryption Keys. Intel has released updates for Intel ME, SPS, and TXE firmware to address encryption key-spilling flaw. Read more
[ZDNET.COM]

==========

NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems September 2018 https://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-september-2018.

IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.

BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.

==========

Encryption – Daily Tech Update – October 18, 2018