Abstract flat vector illustration of data encryption concept isolated on red background. Design elements for webENCRYPTION

ELECTRONIC FRONTIER: New National Academy of Sciences Report on Encryption Asks the Wrong Questions. The National Academy of Sciences (NAS) has released a much-anticipated report that attempts to influence the encryption debate by proposing a “framework for decisionmakers.” At best, the report is unhelpful. At worst, its framing makes the task of defending encryption harder. Read more
[EFF.ORG]

MICROSOFT: Data Encryption Using Always Encrypted in SQL Server. Data security is always a matter of concern for organizations and application users. The key challenge for any developer or architect is to understand all the concerns and build a foolproof system to ensure data security. This is not only more intense, but more complex these days, as many organizations are planning to move their applications to the cloud. There’s a lot of room for small and mid-size organizations to take maximum advantage in this time of technology transformation. All of these small and mid-size organizations want to explore the benefits of the cloud. However, the biggest threat, Data Security, needs to be dealt with. Read more
[DATABASEJOURNAL.COM]

CLOUD CONTENT: Using Structured Encryption to Search Protected Photos in the Cloud. In a recent presentation at the Real World Crypto symposium, researchers affiliated with Brown University and a startup called Pixek presented their work developing an app that encrypts photos at the moment they’re taken and uploads them in encrypted form to a cloud server, in such a way that the keys remain on the user’s device, meaning the service provider can’t view the photos. Despite that, the photos remain searchable using automated tags generated by image classifiers, thanks to a largely theoretical tool called “structured encryption,” which provides for the ability to do computational work on a system without the system knowing what kind of work it is doing. Read more.
[BOINGBOING.COM]

MORE CLOUD: How Secure Is Your Data When It’s Stored in the Cloud? As cloud storage becomes more common, data security is an increasing concern. Companies and schools have been increasing their use of services like Google Drive for some time, and lots of individual users also store files on Dropbox, Box, Amazon Drive, Microsoft OneDrive and the like. They’re no doubt concerned about keeping their information private—and millions more users might store data online if they were more certain of its security. Read more.
[SCIENTIFICAMERICAN.COM]
==========

NOW ON SLIDESHARE: Tech Update Summary from Blue Mountain Data Systems January 2018 https://www.slideshare.net/BMDS3416/tech-update-summary-from-blue-mountain-data-systems-january-2018.

IT SECURITY SUPPORT: Blue Mountain Data Systems is actively involved in implementing FISMA and NIST standards with Federal Civilian Agencies. Due to our extensive experience in this area, Blue Mountain has developed processes and organizational techniques to help ensure security deliverables are completed on time, and performed in the most efficient manner possible. We ensure that NIST-800-53 control requirements are treated consistently during definition, analysis, implementation, auditing, and reporting phases of a system. Find out more about Blue Mountain Data Systems IT Security Support Services. Call us at 703-502-3416.

BLUE MOUNTAIN DATA SYSTEMS HAS THE EXPERIENCE: 1994 to Present – U.S. Dept. of Labor, Employee Benefits Security Administration. Responsible to the Office of Technology and Information Systems for information systems architecture, planning, applications development, networking, administration and IT security, supporting the enforcement of Title I of the Employee Retirement Income Security Act — ERISA. Within the EBSA, Blue Mountain is responsible for design, development and support for its various enforcement database management systems, as well as all case tracking and customer service inquiry systems. Blue Mountain also provides IT security services to the EBSA, in the form of FISMA Assessment and Authorization, System Security Plans, Risk and vulnerability assessments, monitoring and investigation support. Read more.

==========

Encryption – Daily Tech Update – February 20, 2018

Leave a Reply