Category: Crypto/Security

Migrate to AWS Wickr for Secure Communications and Data Retention

During re:Invent 2022, we were thrilled to announce the general availability of AWS Wickr—a new version of Wickr Pro that offers additional features. With AWS Wickr, you can protect business communications with 256-bit end-to-end encryption, while working to meet internal and external retention requirements for records. AWS Wickr provides all

Read more →

AWS Wickr Overview

AWS Wickr is an end-to-end encrypted service that helps organizations collaborate securely through one-to-one and group messaging, voice and video calling, file sharing, screen sharing, and more. With AWS Wickr, customers can address data retention legal risks associated with consumer-grade messaging apps, and safely facilitate collaboration. Advanced security and administrative

Read more →

Wickr’s Messaging Protocol

The Wickr Secure Messaging Protocol provides a platform for secure communications. This White Paper describes a method for sending messages with a set of security properties afforded by our core messaging protocol. You can get the source code here Authors: Chris Howell, Tom Leavy & Joël Alwen Special thanks to

Read more →

Addressing federal record retention in mobile device messaging

There are hundreds of US federal government departments and agencies. The vast majority are subject to Federal Records Act (FRA) and National Archives and Records Administration (NARA) regulations that require them to collect, store, and manage federal records that are created, received, and used in daily operations. NARA defines federal

Read more →

How CISOs Can Demonstrate the ROI of Their Cybersecurity Program

More and more, CISOs are turning to the quantification of cyber risks versus deployed controls to demonstrate the ROI of cybersecurity programs. The increase in cybersecurity spending bodes well for enterprises, although CISOs must improve their methods to engage with the rest of the board and unlock bigger budgets to

Read more →

What is Post-Quantum Encryption and Why it Matters?

As humanity marches unflinchingly toward the future, we need to anticipate the impact that emerging technologies will have on our society. Ethical concerns surrounding data privacy, digital authoritarianism, mass surveillance, and algorithmic biases continue to plague researchers working in quantum computing, artificial intelligence (AI), and machine learning (ML). The diminishing

Read more →

Here’s What the U.S. Government is Expected to Invest in Cybersecurity

After months of marking up a dozen spending bills, legislators have finalized the cybersecurity budget for the fiscal year 2023. The collective set of bills allocates $15.6 billion for cybersecurity spending in federal departments and agencies. As part of the administration’s efforts to strengthen defenses against cyberattacks, the bulk of

Read more →

Wickr RAM available in Department of Defense Cloud One

Wickr RAM (Recall, Alert and Messaging) is now available to the U.S. Department of Defense (DOD) through Cloud One, which is a cloud hosting infrastructure and service. Wickr RAM is an end-to-end encrypted full suite collaboration application built for the warfighter. It is available on GovCloud and can support workloads up to Impact Level

Read more →

Encryption Best Practices Every CISO Should Adopt

The magnitude of data-driven operations that organizations rely on will only increase with time. Having a clear and effective encryption strategy for 2022 is paramount to maintaining a secure perimeter around your data landscape. Although we’ve discussed the best practices for enterprise encryption in this post previously, operational technology continues

Read more →

Top 5 Data Privacy and Security Challenges for Enterprises

Enterprises have to improve their security posture and ensure compliance with data privacy legislation as part of their core mandate. The use of digital and cloud technologies continues to increase, creating a veritable vista of new challenges within the enterprise data landscape. Balancing the need for increased productivity and operational

Read more →

5 Ways to Think of Secure Distributed Data Storage

Secure distributed data storage is the wave of the future for corporate IT. It’s all about spreading the risk by storing data across multiple servers. Distributing data across a network, either on-premise or in the cloud, speeds up data transfers and reduces the potential harm that can result from individual

Read more →