Compliance ITAR Encryption Rule + Local Key Security According to the March 2020 ITAR encryption addendum, ITAR regulated data stored or transmitted in the cloud must be “end-to-end encrypted” (E2EE). In order to properly satisfy this rule, E2EE encryption requires that the keys used for encryption and decryption be stored locally on the endpoints, not on a server Brendan Diaz • 5 min read
Cryptography & Cybersecurity Why Cybersecurity Teams Need Out-of-Band Communications Microsoft Teams, OneDrive, Slack, Box, and other centralized collaboration tools are great for a lot of reasons… but quick gut check - does it make sense that the primary targets of any cyber attack are the tools cyber defenders rely on to coordinate a response? HighSide Staff • 3 min read
Cryptography & Cybersecurity Threat Modeling: Encryption Keys E2E encryption has been hailed as the savior for modern security teams trying (almost aimlessly) to protect their sensitive and regulated data. However, traditional implementations have really fallen short of a true security "silver bullet". Brendan Diaz • 4 min read
Cryptography & Cybersecurity Threat Modeling: A Blog Series When HighSide does anything, we carefully consider the "threat model" to ensure we have eliminated 99.99% of the possibilities of data compromise. While I'd like to say 100%, unfortunately there is no perfect system - but with HighSide, our system starts with a metaphorical solid Evan Blair • 2 min read
Compliance ITAR and Encryption: What You Need to Know According to the March 2020 ITAR encryption addendum, ITAR regulated data stored or transmitted in the cloud must be “end-to-end encrypted” (E2EE). Additionally, ITAR regulations state that "The means of decryption are not provided to any third party." [https://www.ecfr.gov/current/title-22/part-120#p-120.54(b) Brendan Diaz • 2 min read
Controlled File-Sharing Don't Gamble w/ File-Sharing When it Comes to Security, Control and Compliance Securely sharing files with colleagues and partners isn’t easy. While there are many user-friendly consumer-focused collaboration tools on the market like OneDrive, Dropbox, and Google Drive, these lack the security measures necessary to confront the increasingly sophisticated level of threats targeting modern enterprises. Many organisations rapidly deployed cloud storage HighSide Staff • 4 min read
Cryptography & Cybersecurity [Video] TechTalk w/ HighSide Chief Product Officer HighSide's very own co-founder and Chief Product Officer, Andy Johnson, was invited to join James Rees from our partner Razorthorn to chat through all things secure communications and controlled file-sharing. If you've got 40 minutes, I'd highly recommend watching the whole thing! However, if Andy Johnson • 2 min read
Controlled File-Sharing How are you controlling your data as it flows out into the supply chain? As more workplaces adopt cloud collaboration tools as a result of the Covid pandemic, the data supply chain is becoming increasingly difficult to secure. When employees exchange information through collaboration platforms like Microsoft Teams, Slack, and Google Drive, this data isn’t just sent to the recipient, it’s also HighSide Staff • 4 min read
Compliance A New Year's Resolution: Low Hanging Fruit Hardly anything is predictable anymore: Covid-19, remote work, supply chain, social media vulnerabilities, data security, employee retention. It is tough doing any strategic planning these days with so many fundamental uncertainties and even tougher just managing a business day-to-day. Evan Blair • 2 min read
Cryptography & Cybersecurity When your mission is one of national security, HighSide is the only platform that can be trusted. Zero Trust E2E Encrypted Messaging for Rapid Deployment & Sustained Communications Special operations, intelligence and mission oriented support teams are at the frontlines, dealing with rapidly changing situations on the ground. Ensuring secure and reliable digital text based communications with team members, allies and command structure is critical to executing HighSide Staff • 2 min read