Compliance ITAR Encryption Rule + Local Key Security According to the March 2020 ITAR encryption addendum, ITAR regulated data stored or transmitted in the cloud must be “end-to-end encrypted” (E2EE). In order to properly satisfy this rule, E2EE encryption requires that the keys used for encryption and decryption be stored locally on the endpoints, not on a server Brendan Diaz • 5 min read
News Highside chooses Nine23 to provide UK Sovereign Secure communications, controlled file-sharing, and compliant collaboration services HighSide Inc has signed a contract with Nine23 Ltd (“Nine23”), a UK Sovereign Cloud provider of cyber security solutions for the regulated and compliant market, to deploy a UK Sovereign HighSide One Service. HighSide Staff • 3 min read
News Independent Analyst, Forrester, Names HighSide a Leader in Secure Communications HighSide, the market leader in secure communications & collaboration, announced that Forrester Research, Inc. had named HighSide a leader in the Forrester Wave™ Secure Communications, Q3 2022. HighSide Staff • 3 min read
Cryptography & Cybersecurity Why Cybersecurity Teams Need Out-of-Band Communications Microsoft Teams, OneDrive, Slack, Box, and other centralized collaboration tools are great for a lot of reasons… but quick gut check - does it make sense that the primary targets of any cyber attack are the tools cyber defenders rely on to coordinate a response? HighSide Staff • 3 min read
Controlled File-Sharing The Challenge of Making Regulated Data Both Available and Secure When it comes to collaboration, the more available your data is to your employees, the less secure it is. Many organisations struggle to strike a balance between ensuring that employees have instant access to the data they need to do their jobs while shielding sensitive data from unauthorised users. With HighSide Staff • 4 min read
Cryptography & Cybersecurity Threat Modeling: Encryption Keys E2E encryption has been hailed as the savior for modern security teams trying (almost aimlessly) to protect their sensitive and regulated data. However, traditional implementations have really fallen short of a true security "silver bullet". Brendan Diaz • 4 min read
Cryptography & Cybersecurity Threat Modeling: A Blog Series When HighSide does anything, we carefully consider the "threat model" to ensure we have eliminated 99.99% of the possibilities of data compromise. While I'd like to say 100%, unfortunately there is no perfect system - but with HighSide, our system starts with a metaphorical solid Evan Blair • 2 min read
Compliance ITAR and Encryption: What You Need to Know According to the March 2020 ITAR encryption addendum, ITAR regulated data stored or transmitted in the cloud must be “end-to-end encrypted” (E2EE). Additionally, ITAR regulations state that "The means of decryption are not provided to any third party." [https://www.ecfr.gov/current/title-22/part-120#p-120.54(b) Brendan Diaz • 2 min read
Controlled File-Sharing Don't Gamble w/ File-Sharing When it Comes to Security, Control and Compliance Securely sharing files with colleagues and partners isn’t easy. While there are many user-friendly consumer-focused collaboration tools on the market like OneDrive, Dropbox, and Google Drive, these lack the security measures necessary to confront the increasingly sophisticated level of threats targeting modern enterprises. Many organisations rapidly deployed cloud storage HighSide Staff • 4 min read
Cryptography & Cybersecurity [Video] TechTalk w/ HighSide Chief Product Officer HighSide's very own co-founder and Chief Product Officer, Andy Johnson, was invited to join James Rees from our partner Razorthorn to chat through all things secure communications and controlled file-sharing. If you've got 40 minutes, I'd highly recommend watching the whole thing! However, if Andy Johnson • 2 min read