Security & Encryption After Edward Snowden

It's been almost four years since Edward Snowden leaked US National Security Agency documents revealing the extent of the organisation's surveillance of global internet traffic, but he's still making the headlines in Germany.

There have been a lot of changes on the Internet in those four years, but one of the biggest is the growth in the use of encryption.

In 2013, the NSA had free rein and could listen in on almost any communication it wanted. Now, it's commonplace to encrypt traffic to webmail services and even popular websites such as Microsoft.com or Google.com using the https protocol. And you don't have to be an enemy of the state to use an end-to-end encrypted messaging system such as WhatsApp simply to chat with friends.

The encryption seems to be working, too. Leaked files from the US Central Intelligence Agency, published by Wikileaks, show no obvious signs that fundamental encryption systems have been broken. Instead, the agency's focus seems to have been on subverting smartphones and other terminal devices so that it can access data before encryption, or after decryption.

Keeping unwanted visitors, of whatever nationality, away from your data is therefore key, and some of the exhibitors at Cebit have ways to help you do just that.

Secusmart, the BlackBerry subsidiary that secures German Chancellor Angela Merkel's smartphone, is showing new a version of its SecuSuite security software compatible with Samsung Electronics' Knox platform. That means that organisations looking for smartphones offering government-grade security will soon be able to buy a Samsung Galaxy S7 or S8 rather than the now-discontinued BlackBerry OS smartphones like the one Merkel uses. 

In addition to encrypting communications and data stored on the device, SecuSuite for Samsung Knox also secures voice calls using the SNS standard set by Germany's Federal Office for Information Security (BSI). 

Genua is showing its Data Diode. Named for the electronic component that only allows current to flow in one direction, it allows the transfer of data, log files, backups and emails into a network at up to 3 Gbit/s, while ensuring that only the necessary protocol status messages are sent back.

Sometimes we choose to let data escape from our networks. The digital assistants in our phones and in appliances like Amazon Echo or Google Home record a lot of what we say and do, and send it to their creators' cloud services for processing. 

Amazon's lawyers have recently been fighting to keep that information secret for its customers, but if you don't want to rely on a court verdict for your privacy, you might prefer your voice-controlled assistant to do all its processing at home. 

Semvox has developed an intelligent speech interaction system, ODP S3, that operates locally or in the cloud. It says it's suitable for automotive, industrial, smart home, medical device and robotics applications, among others.

Best practice, these days, is to encrypt all your data at rest, something that many operating systems will do for you these days. What do you do, though, if you didn't encrypt the data on an older device, but now want to securely dispose of its hard disk? If you only have a few such disks you can just drill holes in them, but after a while that will get boring. If you're decommissioning hundreds of disks, you might want to automate things with the HDS230 hard drive shredder from HSM. 

They have a plentiful supply of disks to shred, but you can also bring your own if you really won't need that data again.

If you did encrypt your data, you'll need to remember the password. But if you need to share access to that data, what then? Remembering passwords, and remembering who in the enterprise should have access to them, is the job of Password Safe from Mateso. 

The software can provide temporary, time-controlled access to passwords, logging who has used them and when. If it's too late and you've already forgotten your password, maybe the magician on the Mateso stand can pull it out of thin air.

Computerworld

CIA leak 'absolutely' an 'inside job':

Snowden Helping To Protect Journalists:

UK Accused Of 'full-frontal attack' On Whistleblowers:

 

 

« A Quick Tour Of Cybercrime’s Underground
Cybersecurity’s Human Side Is A Problem »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Thycotic

Thycotic

Thycotic prevents cyber attacks by securing passwords, protecting endpoints and controlling application access.

Cyber Security National Lab (CINI)

Cyber Security National Lab (CINI)

The Cyber Security National Lab brings together Italian academic excellence in Cyber Security research.

e2e-assure

e2e-assure

e2e Protective Monitoring and Security Operations Centre (SOC) Service is a complete cyber defence service to protect your critical assets from cyber attacks and GDPR breaches.

CETIC

CETIC

CETIC is an applied research centre in the field of ICT. Key technologies include Big Data, Cloud Computing, the Internet of Things, software quality, and trust and security of IT systems.

Interos

Interos

Interos is the operational resilience company — reinventing how companies manage their supply chains and business relationships — through a breakthrough AI SaaS platform.

Cisco Systems

Cisco Systems

Cisco helps seize the opportunities of tomorrow by proving that amazing things can happen when you connect the unconnected.

CCX Technologies

CCX Technologies

CCX Technologies design and develop a wide range of cybersecurity and testing solutions for the aviation, and military and government markets.

Pangu Laboratory

Pangu Laboratory

Beijing Qi an Pangu Laboratory Technology Co., Ltd. was established on the basis of Pangu laboratory, a well-known cyber security team.

TachTech

TachTech

TachTech is passionate about trust, security and privacy in the digital world. We create tailored security and compliance solutions to improve your business.

Beround

Beround

Beround is an IT consultancy firm specialized in software testing.

CyberXpert

CyberXpert

CyberXpert is your cybersecurity partner for the public and private sector in Belgium.

63Sats Cybertech

63Sats Cybertech

63SATS is the cybersecurity business unit of 63 Moons Technologies, a world leader in providing next-generation technology ventures, innovations, platforms, and solutions. 

CyberEPQ

CyberEPQ

CyberEPQ (Cyber Extended Project Qualification) is the UK’s first and only Extended Project Qualification in Cyber Security.

Eclypses

Eclypses

Eclypses has a disrupting cyber technology, offering organizations an advanced data security solution called MicroToken Exchange (MTE).

Infrassist Technologies

Infrassist Technologies

We're Infrassist - a trusted white label Managed IT & Professional Services partner for MSP businesses.

CYSEC Global

CYSEC Global

CYSEC Global is a series of summits dedicated to tackle regional cyber security challenges.