Symphony Blog

Posts by Lawrence Miller

Encryption Isn’t Just About Confidentiality, But Integrity

People typically think about encryption as the best way to ensure that communications are confidential. But there’s another use that’s equally important and often overlooked - protecting data at rest, which includes the integrity of records where they are stored.

Read More

Symphony and “Responsible Encryption”

The FBI has raised the alarm that cutting-edge encryption technologies enable criminals and terrorists to shield their wrongdoing from detection and investigation. To prevent wrongdoers from “going dark,” they have urged those who manufacture digital systems to engineer mechanisms to ensure law enforcement access to encrypted records.

Read More

Wrestling with GDPR Compliance?

The General Data Protection Regulation (GDPR) is a new data security and privacy regulation for enterprises conducting business in the European Union. It requires strengthening of controls on how enterprises protect, use, and share their customers’ data.

Read More

Do You Know Who has Access to Your Company’s Collaboration Data?

Your most widely used business tool – your collaboration platform – may be putting your business at risk.  No one wants to experience a data breach.  What is the cause of this risk?

Read More

Why Slack’s Customers Really Do Need End-to-End Encryption

Earlier this month, Slack’s CSO made public comments stating that its customers aren’t interested in end-to-end encryption, so it’s not a priority for the company. For a company which claims to be the platform "where work happens,” this decision to dismiss such a powerful tool to protect their customer data is concerning, especially when it comes from their top security executive.

Read More

The Inherent Problem with Data

No one should be surprised about the recent news that Facebook gave some companies special access to user data, allowing them access even after the company had made policy changes restricting it for others. This is the inherent problem with giving control over your data to any technology provider.

Read More