Compliance ITAR Encryption Rule + Local Key Security According to the March 2020 ITAR encryption addendum, ITAR regulated data stored or transmitted in the cloud must be “end-to-end encrypted” (E2EE). In order to properly satisfy this rule, E2EE encryption requires that the keys used for encryption and decryption be stored locally on the endpoints, not on a server Brendan Diaz • 5 min read
Cryptography & Cybersecurity Threat Modeling: Encryption Keys E2E encryption has been hailed as the savior for modern security teams trying (almost aimlessly) to protect their sensitive and regulated data. However, traditional implementations have really fallen short of a true security "silver bullet". Brendan Diaz • 4 min read
Compliance ITAR and Encryption: What You Need to Know According to the March 2020 ITAR encryption addendum, ITAR regulated data stored or transmitted in the cloud must be “end-to-end encrypted” (E2EE). Additionally, ITAR regulations state that "The means of decryption are not provided to any third party." [https://www.ecfr.gov/current/title-22/part-120#p-120.54(b) Brendan Diaz • 2 min read
Cryptography & Cybersecurity The State of in-Security in Collaboration & Cloud File Sharing Applications Data security, privacy and access integrity has never been more at risk. In this post we’re going to talk about how the communication, file sharing and file storage layers have become a huge security vulnerability for organizations of all sizes, why, and what you can do about it. Your Brendan Diaz • 16 min read
News ClearChat Becomes HighSide, Inc Bottomline Up Front For those of you not interested in all of the exciting details, this is what you need to know: ClearChat, Inc is now HighSide, Inc. To get the new HighSide app, all you have to do is boot up your existing install of ClearChat and after about Brendan Diaz • 6 min read
Cryptography & Cybersecurity Forget Apple vs FBI, Slack & Gmail already have Backdoors Apple vs FBI should be the least of your concerns, because right now your emails, chats and files are not private, and they’re certainly not secure. Not at home, and not at work. If you’re like most internet-goers there’s a good chance you’re using some combination Brendan Diaz • 19 min read