Considerations Regarding Encryption and Exceptional Access Briefing
On June 12, 2018, the Internet Society hosted a briefing for Congressional staff on encryption and lawful access. Considerations Regarding Encryption and Exceptional Access offered an opportunity for participants to learn more about the technical aspects of encryption, risks associated with creating back doors, and other technical means for lawful access.
Before beginning the conversation, participants were given a primer on encryption, which offered high-level explanation of different kinds of encryption and exceptional access, and shown a video on end-to-end encryption, which used colors to explain how encryption keys are exchanged. Encryption experts, including Christine Runnegar (Senior Director, Internet Trust, Internet Society), Robyn Greene (Policy Counsel and Government Affairs Lead, Open Technology Institute), and Maurice Turner (Senior Technologist, Center for Democracy and Technology), then engaged in a two-hour, in-depth conversation with participants, answering questions and discussing global norms and policies.
The panelists emphasized that encryption is currently the most robust security tool in existence, but just as it gets more sophisticated, so too do hackers. Sooner or later this security tool will likely be bypassed and new tools will need to be created. Weakening encryption by creating keys for “backdoor” access that can evade its security measures makes any Continue reading
The visibility tool is part of the company’s Internet Intelligence initiative and uses technology acquired from Dyn, a cloud-based domain name service provider Oracle bought in 2016.
The expanded management capabilities use an application management plane that can work across different cloud providers and in on-premises locations.


In today’s DockerCon keynote we previewed an upcoming Docker Desktop feature that will make it easier than ever to design your own container-based applications. For a certain set of developers, the current iteration of Docker Desktop has everything one might need to containerize an applications, but it does require an understanding of the Dockerfile and Compose file specifications in order to get started and the Docker CLI to build and run your applications.
Cisco plans to add intent-based networking functionality to its SD-WAN offering in the next 12 to 18 months.

Ryan Windham is the network management company’s second CEO this year. Anand Purusothaman became CEO after Manuel Rivelo left in January, and while Windham dealt with the acquisition of Cedexis.
The Alta 4.2 release supports Amazon Web Services EC2 cloud-native workloads and traditional IBM AIX and Oracle Solaris environments.