Cryptography & Cybersecurity Threat Modeling: Encryption Keys E2E encryption has been hailed as the savior for modern security teams trying (almost aimlessly) to protect their sensitive and regulated data. However, traditional implementations have really fallen short of a true security "silver bullet". Brendan Diaz • 4 min read
Cryptography & Cybersecurity Threat Modeling: A Blog Series When HighSide does anything, we carefully consider the "threat model" to ensure we have eliminated 99.99% of the possibilities of data compromise. While I'd like to say 100%, unfortunately there is no perfect system - but with HighSide, our system starts with a metaphorical solid Evan Blair • 2 min read
Compliance ITAR and Encryption: What You Need to Know According to the March 2020 ITAR encryption addendum, ITAR regulated data stored or transmitted in the cloud must be “end-to-end encrypted” (E2EE). Additionally, ITAR regulations state that "The means of decryption are not provided to any third party." [https://www.ecfr.gov/current/title-22/part-120#p-120.54(b) Brendan Diaz • 2 min read
Compliance A New Year's Resolution: Low Hanging Fruit Hardly anything is predictable anymore: Covid-19, remote work, supply chain, social media vulnerabilities, data security, employee retention. It is tough doing any strategic planning these days with so many fundamental uncertainties and even tougher just managing a business day-to-day. Evan Blair • 2 min read
Compliance ITAR & EAR: Think You Are Compliant? Think Again... Anyone doing business with the US government and / or producing technology or physical goods that the US considers controlled needs to spend 5 minutes here and get a refresher on ITAR and EAR. The biggest thing that scares me when I think about how folks are handling their sensitive communications Evan Blair • 4 min read
Compliance Facebook's whistleblower and what it means for your data security & GDPR program With the recent testimony in Congress on October 5 by former Facebook employee and now whistleblower, Frances Haugen, has drawn the curtain back on management’s priorities at the company, and it isn’t good. Basically, she claims profits are the top priority among Facebook’s leaders. [https://www.vox. Evan Blair • 3 min read
Compliance Understanding & Meeting UK MOD’s DEFCON 658 Regulatory Framework Like CMMC in the United States [https://highside.io/blog/people-process-technology-understanding-what-cmmc-means-for-your-organization/] , The UK Ministry of Defence’s (MOD) DEFCON 658 [https://www.gov.uk/government/publications/defence-condition-658-cyber-flow-down] is a cybersecurity regulatory framework that applies to any organisation doing business with the MOD. The goal of DEFCON 658 is to protect Evan Blair • 2 min read
Compliance People, Process & Technology: Understanding What CMMC Means For Your Organization In Monty Python and the Holy Grail, Sir Lancelot charges guards at a castle’s gates, but abnormally. There is repeated footage of a distant charging Sir Lancelot alternated in with footage of the peaceful guards. Each time the camera cuts back to Sir Lancelot, he is charging from the Evan Blair • 4 min read
Cryptography & Cybersecurity HighSide CSO Aaron Turner dishes on Zoom and the (in)security of modern business technology on the RSA Conference Podcast TikTok and Huawei are probably two of the most notable Chinese technology companies that are enveloped in policy debates. The US government’s most recent actions against TikTok could be an indication of future actions that could be taken against Chinese technology companies. Join us for the important discussion about Evan Blair • 1 min read