Cryptography & Cybersecurity Threat Modeling: Encryption Keys E2E encryption has been hailed as the savior for modern security teams trying (almost aimlessly) to protect their sensitive and regulated data. However, traditional implementations have really fallen short of a true security "silver bullet". Brendan Diaz • 4 min read
Cryptography & Cybersecurity Threat Modeling: A Blog Series When HighSide does anything, we carefully consider the "threat model" to ensure we have eliminated 99.99% of the possibilities of data compromise. While I'd like to say 100%, unfortunately there is no perfect system - but with HighSide, our system starts with a metaphorical solid cement box. If your Evan Blair • 2 min read
Compliance ITAR and Encryption: What You Need to Know According to the March 2020 ITAR encryption addendum, ITAR regulated data stored or transmitted in the cloud must be “end-to-end encrypted” (E2EE). Additionally, ITAR regulations state that "The means of decryption are not provided to any third party." [https://www.ecfr.gov/current/title-22/part-120#p-120.54(b)(1)(ii) Brendan Diaz • 2 min read
News SAP National Security Services & HighSide Finalize Partnership to Deliver FedRAMP and DOD Approved Controlled File-Sharing & Collaboration HighSide, Inc., the leader in Controlled File-Sharing & Collaboration, and SAP’s (NYSE: SAP) National Security Services (SAP NS2 [sapns2.com]) division have partnered to co-sell and deliver HighSide’s e2e encrypted file-sharing, collaboration, and communications platform in a FedRAMP and DoD approved cloud hosting environment. SAP NS2 [sapns2.com] selected Evan Blair • 2 min read
Compliance A New Year's Resolution: Low Hanging Fruit Hardly anything is predictable anymore: Covid-19, remote work, supply chain, social media vulnerabilities, data security, employee retention. It is tough doing any strategic planning these days with so many fundamental uncertainties and even tougher just managing a business day-to-day. Evan Blair • 2 min read
News SAIC Selects HighSide to Deliver E2E Encrypted Communications to US Government Customers HighSide, Inc., the leader in end-to-end (E2E) encrypted collaboration, has been selected by Science Applications International Corp [saic.com]. (NYSE: SAIC) to bring HighSide’s secure sharing, collaboration and communications platform to U.S. government customers. HighSide’s E2E encrypted messaging and collaboration application will be available through SAIC’s Evan Blair • 2 min read
Compliance ITAR & EAR: Think You Are Compliant? Think Again... Anyone doing business with the US government and / or producing technology or physical goods that the US considers controlled needs to spend 5 minutes here and get a refresher on ITAR and EAR. The biggest thing that scares me when I think about how folks are handling their sensitive communications Evan Blair • 4 min read
Compliance Facebook's whistleblower and what it means for your data security & GDPR program With the recent testimony in Congress on October 5 by former Facebook employee and now whistleblower, Frances Haugen, has drawn the curtain back on management’s priorities at the company, and it isn’t good. Basically, she claims profits are the top priority among Facebook’s leaders. [https://www.vox. Evan Blair • 3 min read
Compliance Understanding & Meeting UK MOD’s DEFCON 658 Regulatory Framework Like CMMC in the United States [https://highside.io/blog/people-process-technology-understanding-what-cmmc-means-for-your-organization/] , The UK Ministry of Defence’s (MOD) DEFCON 658 [https://www.gov.uk/government/publications/defence-condition-658-cyber-flow-down] is a cybersecurity regulatory framework that applies to any organisation doing business with the MOD. The goal of DEFCON 658 is to protect Evan Blair • 2 min read
Compliance People, Process & Technology: Understanding What CMMC Means For Your Organization In Monty Python and the Holy Grail, Sir Lancelot charges guards at a castle’s gates, but abnormally. There is repeated footage of a distant charging Sir Lancelot alternated in with footage of the peaceful guards. Each time the camera cuts back to Sir Lancelot, he is charging from the Evan Blair • 4 min read