Senators ask Trump nominees to aid in Russia probe even if it damages president – USA TODAY

Senate Intelligence Chairman Richard Burr heads to a committee meeting on Capitol Hill on July 18, 2017.(Photo: Mark Wilson, Getty Images)

WASHINGTON Two of President Trump's nominees for high-level intelligence jobs promised the Senate Intelligence Committee to cooperate with the panel's Russia investigation, even if the information they uncover proves damaging to Trump.

Sen. Ron Wyden, D-Ore., asked the presidents nominee for assistant secretary of Treasury for intelligence and analysis whether she will make it a top priority to investigate Russia's use of shell corporations to launder money in the U.S. even it leads to "ties to the president's business, family or campaign."

"I will take the intelligence wherever it goes," promised nominee Isabel Patelunas, a longtime analyst for the CIA, at a committee hearing Wednesday.

The Senate Intelligence Committee, along with the Senate Judiciary Committee and the House Intelligence Committee, are investigating Russia's interference in the 2016 presidential election and possible ties between the Trump campaign and Russian officials.

Both Patelunas and Susan Gordon, the president's nominee for principal deputy director of national intelligence, were asked by Sen. Mark Warner, D-Va., whether they would commit to working with the committee on its Russia investigation.

"I certainly will, sir," Patelunas responded. Gordon, who is also acareer CIA officer, promised to do the same.

Committee Chairman Richard Burr, R-N.C., and Sen. Dianne Feinstein, D-Calif., also pressed Gordon and Robert Storch, Trump's nominee to be inspector general of the National Security Agency, about how they can stop leaks of classified information by NSA contractors.

The most famous of those leaks came in 2013, when former NSA contractor Edward Snowden leaked classified information about NSA surveillance programs, including the mass collection of phone records from millions of Americans who weren't suspected of any terrorist activity.

While members of Congress generally denounced Snowden's actions, his revelations led lawmakers in 2015 to pass the USA Freedom Act, which ended the controversial bulk collection of data.

In addition to the Snowden case, there have been two other major leaks by NSA contractors. In early June, a 25-year-old federal contractor was arrested in Georgia in connection with a classified NSA report on Russian election interference published by the online publicationThe Intercept.

The report said that Russian military intelligence conducted a cyber attack on at least one supplier of voting software and sent phishing emails containing malicious software to more than 100 local election official just days before the 2016 election,The Interceptreported.

"Do you commit to us ... to try to figure out how to plug this problem?" Burr asked Gordon, who said yes.

"I believe unauthorized leaks of classified information are always damaging," she said, adding that they are "not in this nation's interest."

Storch also promised Feinstein that he would look into the problem and evaluate the NSA's security.

"I absolutely would pledge to you that it is something we would explore," Storch said.

Read more:

Mueller now investigating Donald Trump Jr.'s Russia meeting

House Intelligence Committee boosts its own cyber defenses

Democrats target Ivanka Trump security clearance amid Kushner scrutiny

Read or Share this story: https://usat.ly/2vjm1Pn

Originally posted here:
Senators ask Trump nominees to aid in Russia probe even if it damages president - USA TODAY

What is an Encryption Key? – Definition from Techopedia

Encryption is a type of security that converts data, programs, images or other information into unreadable cipher. This is done by using a collection of complex algorithms to the original content meant for encryption.

Symmetric forms of encryption systems make use of a single password to serve as both decryptor and encryptor. Symmetric types use algorithms that are very safe. One of such type was adopted by the US Government as Advanced Encryption Standard (AES) to store classified information. However, one drawback is that since a single key is shared, it can be leaked or stolen. As part of key management, it is very important to change the key often to enhance security.

Public asymmetric encryption systems make use of highly secure algorithms as well, but using a different strategy for encryption and decryption. The asymmetric encryption method uses two keys, referred to as a key pair. One is a public key, and the other one is a private key. The public key can be freely shared among various users as it is only meant for encryption. The private key is not shared, and is used to decrypt anything that was encrypted by the public key.

The algorithms used in the encryption process depends on the key pair. In order to reverse the encryption process, only the private key of that particular key pair can be used. The message or mail is then delivered to the public key owner. When the mail is received, the private key requests a passphrase before the decryption process. In order to maintain optimal security, this passphrase must be delivered manually; however, the software lets a user locally store the passphrase so that messages may be automatically decrypted.

Since the key that causes decryption is not shared, asymmetric encryption is believed to be more reliable when compared with symmetric encryption.

Read the original:
What is an Encryption Key? - Definition from Techopedia

Quantum Computing Would Make Today’s Encryption Obsolete – Bloomberg

Quantum computing offers processing power so vast it may soon make todays supercomputers look as crude as 1980s PCs. Theres a downsidethe technology might also render the most secure encryption systems obsolete, cracking codes in a matter of minutes rather than months or years. Gregoire Ribordy says he has a solution. And its selling fast in China.

For the past 15 years, the former University of Geneva physics professor has been developing something called quantum key distributiona system that uses the technology to encrypt data so securely that Ribordy says it cant be deciphered even by an advanced quantum computer. The cybersecurity community must recognize the risks of quantum computing, says Ribordy, a former researcher with Nikon Corp. in Tokyo. Our challenge is to help governments and businesses be ready.

For its first decade or so, his company, ID Quantique SA, bumped along slowly, selling its equipment primarily to academics researching the technology. Then in December, ID Quantique signed a joint-venture agreement with China Quantum Technologies, based in Hangzhou. Sales of its quantum key equipment have surged as Chinese banks, government agencies, and state-owned giants such as China Railway Corp. embrace the technology. Ribordy, who says hes sold fewer than 100 servers to U.S. customers, predicts the growing activity in China will spur interest elsewhere. If Chinas doing it, he says, maybe its a good idea to look at why.

While conventional computers interpret data in ones and zeros, a quantum machine can store information in multiple statesas one, zero, both, or something in between. That allows a quantum system to multitask in ways todays binary equipment cannot. A normal computer looking for a name in a phone book cataloged by numbers, for instance, would search one number at a time. A quantum computer could scan all of them simultaneously; where an old machine might sip data through a straw, a quantum system takes in the flow of the Mississippi. And quantum key distribution automatically detects anyone intruding on a transmission, scrambling the key to keep the information safe.

Although the U.S. has long been the leader in quantum key distribution, China has pulled ahead in some areas, says John Costello, a senior analyst at business intelligence company Flashpoint. Chinese researchers in May claimed theyd developed a quantum computer that eclipses those from U.S.-backed ventures; in June another Chinese group said it had successfully used a quantum-enabled satellite to securely transmit data. The level of investment China is putting into quantum has created a massive market, says Costello, whos testified before the U.S. Congress on the topic. He describes ID Quantique as a significant player in China.

Ribordys partner, known as QTEC, says it has built the worlds first commercial network secured by quantum technology, between Shanghai and Hangzhou. The company says its invested about 1 billion yuan ($148 million) in quantum computing, it employs roughly 300 researchers, and its applied for almost 30 patents. In addition to the venture with ID Quantique, QTEC has a joint research lab with Beijings Tsinghua University, a top school with close ties to the Chinese leadership.

As a Swiss company, ID Quantique doesnt have to adhere to U.S. export controls designed to keep rival powers from obtaining sensitive technology. Ribordy says it took less than a month to get an export permit from Switzerland. Revenue last year was under 100 million Swiss francs ($104 million), he says. But in China, the companys fastest-growing market, sales are on track to triple in 2017 and 2018. Every country has to improve its defense against attacks, Ribordy says. China is doing it, and I think other countries should be doing it, too.

The most important business stories of the day.

Get Bloomberg's daily newsletter.

Quantum key distribution has its drawbacks. A pair of ID Quantiques servers sells for about $100,000, and theres a limit to how far the machines can be from one another: Quantum computers communicate by firing photons over fiber-optic lines, which become unreliable at distances beyond a few hundred miles. All those factors led the U.K.s National Cyber Security Centre last November to urge caution against transitioning too soon to quantum key cryptography.

Nonetheless, the agency predicts the cost of quantum key distribution will drop rapidly, and many researchers say its almost inevitable that quantum computing itself will spur sales of more secure encryption technologies. The imminent arrival of far more powerful computers means companies will have to be ready with similar protective firepower, says Richard Murray, who leads the quantum technologies team at Innovate U.K., a government agency that helps foster new technologies. The reason there is a market for this now, he says, is to prepare for the threat of a quantum hack in the future. With Edwin Chan

BOTTOM LINE - Quantum computing could render todays encryption obsolete. A Swiss company, ID Quantique, says its technology can keep data safe, and China is a top customer.

Read the rest here:
Quantum Computing Would Make Today's Encryption Obsolete - Bloomberg

Apple sends top executives to lobby Australian government over … – AppleInsider (press release) (blog)

By Mikey Campbell Wednesday, July 19, 2017, 10:29 pm PT (01:29 am ET)

Citing unnamed sources, The Sydney Morning Herald reports Apple met with Australian Attorney-General George Brandis and members of Prime Minister Malcolm Turnbull's government on Tuesday to talk over the cybersecurity measures.

At least one of the engagements was announced on Monday, when Brandis said he planned to meet with Apple executives in hopes of persuading the company to share encrypted data with the country's spy and law enforcement agencies.

According to sources familiar with the talks, Apple maintained its strong stance in favor of consumer privacy, saying it does not want to see laws updated to block companies from using encryption technology, the report said. Further, Apple is opposed to furnishing government agencies with cryptographic keys that would allow access to secure messages.

Apple in its meetings with Australian officials looked to cut down on additional regulation and legal obligations that could potentially result from the new laws, sources said.

Turnbull last week proposed a set of updated cybersecurity laws that would force tech companies like Apple, Facebook and Google to provide access end-to-end encrypted communications if obliged to do so by court order. The regulations, which the Turnbull administration is looking to get on the books by year's end, are modeled after the UK's Investigatory Powers Act.

"We've got a real problem in that the law enforcement agencies are increasingly unable to find out what terrorists and drug traffickers and pedophile rings are up to because of the very high levels of encryption," Turnbull said. "Where we can compel it, we will, but we will need the cooperation from the tech companies."

Exactly how the government intends to enforce the proposed rules remains unclear.

End-to-end encryption systems rely on cryptographic keys to encrypt plain text messages as they travel through servers between devices. Importantly, service providers do not have access to private keys and are therefore unable to access conversations.

Members of Turnbull's administration who met with Apple said the government does not want to create backdoors to messaging services, nor does it want to weaken encryption, sources said. Apple's recent meetings were in part meant help the government decide how best to overcome these substantial technical hurdles, the report said.

Continued here:
Apple sends top executives to lobby Australian government over ... - AppleInsider (press release) (blog)

To battle hackers, IBM wants to encrypt the world – Los Angeles Times

There are only two types of companies, it is commonly said: those that have been hacked, and those that just don't know it yet.

IBM Corp. wants to get rid of both. The Armonk, N.Y., computing giant said Monday that it has achieved a breakthrough in security technology that will enable all businesses to encrypt their customer data on a massive scale turning most if not all of their digital information into gibberish that is illegible to thieves with its new mainframe.

"The last generation of mainframes did encryption very well and very fast, but not in bulk," Ross Mauri, general manager of IBM's mainframe business, said in an interview. Mauri estimates that only 4% of data stolen since 2013 was ever encrypted.

As the number of data breaches affecting U.S. entities steadily grows resulting in the leakage every year of millions of people's personal information IBM argues that universal encryption could be the answer to the epidemic of hacking.

The key, according to IBM officials, is an update to the computer chips driving the powerful mainframe servers that house corporate or institutional information and process millions of transactions a day worldwide, such as ATM withdrawals and credit card payments and flight reservations.

Cryptography, the science of turning legible information into coded gobbledygook, is already commonly used among certain email providers and storage services. But because of the enormous computational power needed to quickly encrypt and decrypt information as it passes from one entity to another, many businesses use encryption only selectively if at all. A December report by the security firm Sophos found that while three out of four organizations routinely encrypt customer data or billing information, far more do not encrypt their intellectual property or HR records. Sixty percent of organizations also leave work files created by employees unencrypted, the study found.

All of these represent opportunities for digital criminals, said Austin Carson, executive director of the technology think tank TechFreedom.

"Way too much information is stored in clear text," he said. But universal or pervasive encryption, he added, could help ensure that even if hackers broke into a company's network, any information they found would be impossible to decode. "That would be a huge step forward just in terms of protecting a much larger body of information," Carson said.

But the same technology could frustrate law enforcement, which in recent years has waged a furious battle with Silicon Valley over encryption technology and how extensively it should be used.

In a high-profile dispute last year with Apple Inc., the Justice Department argued that the company should help officials break into an encrypted iPhone used by one of the shooters in the San Bernardino terror attack. Apple refused, saying that developing tools to break encryption would undermine its customers' security, particularly if the tools were to fall into the wrong hands.

Apple's concern is not theoretical: This year's WannaCry ransomware attack, which held thousands of PCs hostage, has been linked to a Windows vulnerability that was secretly discovered and exploited by the National Security Agency long before it leaked into the wild.

In its push to expand universal encryption, IBM is taking Apple's side in the debate.

Lauren Raab and Ben Muessig

Can youtell whether these arereal techniques suggested for hacking theiPhone at the heart of the Apple-FBI fight or ways a James Bond movie character has tried to kill007?

Can youtell whether these arereal techniques suggested for hacking theiPhone at the heart of the Apple-FBI fight or ways a James Bond movie character has tried to kill007? (Lauren Raab and Ben Muessig)

"IBM fully supports the need for governments to protect their citizens from evolving threats," the company said in a statement on the issue. "Weakening encryption technology, however, is not the answer. Encryption is simply too prevalent and necessary in modern society."

For IBM, encryption is also a massive business opportunity. Businesses spend more than $1 trillion a year making sure that their security meets government standards, according to company officials. One aspect of IBM's new approach to mainframes is the concept of automating that compliance work, using artificial intelligence to check that what's being protected passes regulatory muster in various industries.

In doing so, IBM expects to turn a chunk of that annual compliance spending into revenue for itself. And that's on top of the roughly $500,000 it expects to charge new customers for using its newest mainframe technology. Most businesses, Mauri said, will be upgrading from an existing setup, so the cost for those clients could be less.

For some small businesses, that may still be too expensive. Still, the history of technology suggests that with time, those prices may fall.

"This is the turning point. The idea here is that you can start to encrypt all data," Mauri said. But even as IBM makes encrypting everything a priority, security experts like Mauri already have their eyes set on the next holy grail: The ability to securely edit and manipulate encrypted files without ever having to decrypt them in the first place.

Fung writes for the Washington Post.

ALSO

Girl Scouts offers merit badges for making friends, painting and horseback riding. Up next: cybersecurity

Verizon customer data including phone numbers and PINs exposed by vendor

Their code was used to hack Sony and create 'WannaCry.' Meet the 'Lazarus Group,' the armed robbers of the Internet

Read the original here:
To battle hackers, IBM wants to encrypt the world - Los Angeles Times

How a Portland startup is making encryption easier – Portland Business Journal


Portland Business Journal
How a Portland startup is making encryption easier
Portland Business Journal
... it easy for developers. Enlarge. Portland startup Tozny's latest product, InnoVault, is designed to make it easy for more. Tozny. Tozny's new product wants to help developers even those who don't want to become security experts encrypt ...

and more »

Continue reading here:
How a Portland startup is making encryption easier - Portland Business Journal

Security Sense: Can We Please Stop Politicians from Talking About … – Windows IT Pro

Firstly, a quick apology from Australia: were sorry. Look, our Prime Minister and Attorney General didnt try to launch us onto the World Encryption Comedy Stage but unfortunately, here we are.

This all stems from our government (like so many others), deciding that nasty people hide nasty discussions via encrypted chat and that it would be enormously useful for law enforcement to be able to see those discussions. No arguments there from a protect the people perspective, the problem, as always, is how you do that without simultaneously jeopardising the people. When it was put to our PM that the laws of mathematics dont really provide for good guys to intercept communications whilst still protecting our messages from bad guys out, he took a rather unique stance:

Well, the laws of Australia prevail in Australia, I can assure you of that. The laws of mathematics are very commendable but the only laws that applies in Australia is the law of Australia.

Im sorry. On behalf of all of down here, we really didnt want our elected representative to put us on the world stage this way. But it didnt stop there either

Not to be left off the World Encryption Comedy Stage, our Attorney General decided to get in on the act with a zinger of his own. Now, before I relay his message, if youre not already familiar with George Brandis its worth a quick watch of his previous hit, Heres What Metadata Is. (Ive already apologised on behalf of Australia, right?) Anyway, when questioned about the feasibility of reading messages sent by platforms implementing end to end encryption such as WhatsApp and Signal, George had an answer ready:

Last Wednesday I met with the chief cryptographer at GCHQ ... And he assured me that this was feasible.

Now I wasnt in that chat, but Ill take a stab at it and say that this was (almost certainly) not what was said by anyone with a title that includes the word cryptography. Its entirely possible the bloke said something more along the lines of we have other techniques to gain access to messages on devices which would be just fine, but thats obviously not the way our AG heard it nor is it what were now seeing in headlines around the world. (Incidentally, in the same week the former head of the GCHQ made it very clear that encryption is overwhelming a good thing and that you cant uninvent it nor legislate it away.)

Look, weve got to do a better job of monitoring the communications of nasty people because lets face it, theyve never had it so good when it comes to hiding evil conversations. But please, for the love of god, can we stop the politicians from jumping up and making comments like this about something that is complex beyond their comprehension?

Here is the original post:
Security Sense: Can We Please Stop Politicians from Talking About ... - Windows IT Pro

Free and open-source software is changing the way we view infrastructure: FOSSCON 2017 – Technical.ly Philly

Free and open-source software is all around us today, becoming part of our lives in ways we might never know. In the early days FOSS was primarily a hobbyist alternative, but today it has become ubiquitous, making its way into our phones, our cars, our schools, government, offices and even home appliances.

This year at FOSSCON were seeing a new trend as FOSS explodes into the infrastructure space. While hardware is still largely closed behind the walls of patents and trademarks, virtual infrastructure means we are abstracted from the underlying hardware, and more and more infrastructure is being built on top of flexible, open and scalable FOSS solutions.

You can learn more about the expansion of FOSS in infrastructure and what it means to the world at FOSSCON, Philadelphias own Free and Open Source Software Conference. This free all-day event is held annually in Philadelphia, and offers a variety of talks, workshops and other content to let the community explore and learn about Free and Open Source Software. FOSSCON 2017 takes place Saturday, Aug. 26. Registration is quick and easy.

Topics this year include more than just big-business FOSS as an infrastructure solution, with talks on Stargates, Amateur Radio and a dive into the past to talk about punch cards. Attendees can also get help installing Linux on their machines, or learn about some of the other pieces of software they can use on their current computers for free.

In keeping with the Free in the name, FOSSCON is also free for everyone. The event is paid for entirely by FOSS-friendly sponsors, donors and attendees who opt to contribute to the event. The FOSSCON team believes it is important that anyone be able to make it to the event, and never wants the price of a ticket to stand in the way of the great experience that is FOSSCON.

Jonathan Simpson is a systems engineer at CoreDial and an organizer of FOSSCON, the Free and Open Source Software Conference. Check him out on LinkedIn here.

Go here to see the original:
Free and open-source software is changing the way we view infrastructure: FOSSCON 2017 - Technical.ly Philly

Japanese Online Giant GMO Launches Open Source Blockchain Project – Finance Magnates

Internet giant GMO Internet Inc. of Japan today announced the launch of the GMO Blockchain Open Source Software Project (GMO Blockchain OSS). The system will allow users to develop programs using blockchain as open source. In a first attempt by the company using this platform, the company has developed an open source medical record sharing system and launched it on July 6th, 2017.

Learn how to buy Bitcoin and Ethereum safely with our simple guide!

The GMO Blockchain OSS (free to modify, free for commercial) programmes are capable of supporting real service development using blockchain technology. Blockchain technology enables users to record and retain data which can bedistributed on multiple computers. The system is popular for its fraud-resistant capabilities and zero downtime for a low cost. This helps the doctors access the medical history of patients quickly, in times of emergency, as soon as the user gives access to the same.

The company issued a statement on the sidelines of the launch of GMO Blockchain OSS: As the first initiative, we have now created a Medical Record Sharing System based on Z.com Cloud Semi-Public Blockchain and started providing open source from today. We will continue to publish open source programs that meet various needs in the future.

GMO Internet is investing big on developing new services using blockchain technology. This is evident from the companys participation in the cryptocurrency exchange and trading business through the newlyestablished GMO Wallet Co. Ltd. andlaunch of the Z.com Cloud blockchain and ConoHa blockchain for easy creation of distributed blockchain applications.

See original here:
Japanese Online Giant GMO Launches Open Source Blockchain Project - Finance Magnates

Executive Spotlight Interview with Lynne Chamberlain, VP of Business Dev. for Red Hat – ExecutiveBiz (blog)

ExecutiveBiz: What does your role as the leader of business development for the public sector entail?

Lynne Chamberlain: Istarted with Red Hatthirteen years ago and moved to theNorth American Public Sector organization2 years later.

Red Hat has grown from $500M to $3B in revenues during this time and Paul Smiths Public Sector Organization has been a key contributor.

We started the Federal Business Development group to pursue government programs in the DOD, Intel, and Civilian Agencies. Today the organization captures both Federal and SLED programs, and supports our System Integrators through a premier partner program. The Business Development organization working with the top 20 System Integrators has successfully teamed to win major programs within Public Sector. Our continual growth of 30%+ YOY, through closing Open Source solutions that include: Linux, Cloud, Containers, Storage, middleware and management software.I have been fortunate to lead the BD organization to include 26 Capture/Alliance Managers, System Architects and BD Marketing.

ExecutiveBiz: Where do you see open-source software having the greatest impact in the public sector?

Lynne Chamberlain:Open Source softwares greatest impact is in the Cloud and Dev Ops market space.Our Cloud and middleware products provide technology leadership:

Partners, i.e., Amazon and Microsoft turn to Red Hat to secure their cloud platforms and provide customers software defined storage, and middleware.Cloud Forms from Red Hat provides a single pane of glass so customers can manage a hybrid infrastructure that allows customers to transform their environments to take advantage of the best architectures in the software industry.

Red Hat has seen significant growth in the Cyber security market.Our Open Source Linux software is the foundation for many Cyber companies to build their software stack. Companies like Forcepoint, Raytheon uses Red Hat to combat insider threat, and General Dynamics uses Red Hat for mission critical apps. Red Hat was pleased to be part of the CSRA winning team for DISAs MILCOULD.

ExecutiveBiz: You have led the growth of your division thirty percent year over year for the past twelve years. Could you tell our readers how you achieved that?

Lynne Chamberlain:When I came to Red Hat we were known as the Linux software company that provided free software or people thought. Our business model of selling subscriptions instead of perpetual licenses has proved to be the direction of the industry today.It was an easy transition for Red Hat under the Cloud model. About 95% of Public Sector customers use Red Hat Linux software over our competition.Clients use it not only for the security, but also as the building block for our other software. Through the years Red Hat has acquired state of the art software, i.e., middleware, management software, storage and made it OPEN and easy to use by the community.

As the government transforms from the old mainframe technology to the Cloud, it is important for them to find an architecture that allows compatibility to all technologies so organizations are not locked in to any one vendor.

Today, we have so many great solutions not just Linux. When you think of Red Hat, you dont think of just Linux anymore, but instead customers think of our complete stack of solutions and of all these capabilities.Our growth has on one hand been organic with the foundation being a secure OS that adheres to standards, compliance, is efficient and all at a huge cost savings to our partners and end user customers.Weve also grown through acquisitions weve acquired JBOSS, a middleware product, as well as our Cloud and Storage products.We have a whole robust open source software suite today and Gartner portrays this in their 4 Quadrant model.

ExecutiveBiz: How can the public and private sector work closer together to implement Open-source software?

Lynne Chamberlain:Many of the Federal Agencies have adopted Open Source through out their infrastructure.They view the private sector as experts and their choices in architectures and software as key indicators of the future direction of industry.Take the VA, and DHA; they have procured Open source solutions through Cerner and Optum.The SEC looks to Wall Street and their IT decisions. Both the NY Stock Exchange and the NASDAQ run on Red Hat Open Source software. The Department of Treasury looks to the Bank of America, Citibank, etc as to how they build their banking, trading, etc., solutions.They run many of their applications on Red Hat Open Source software.Law Enforcement is tightly connected between DOJ, FBI, and the Police Departments when researching finger print identification, retina scans, etc.The foundation for all this work is done on Red Hat Open Source.Red Hat has a large partner eco-system.The applications running on Red Hat range from Child Welfare, to Toll Authority, to Banking, to Healthcare, to Justice, etc.Red Hat cannot do this alone.Teaming with System Integrators, Value Added Partner, and Resellers, together make this happen.

ExecutiveBiz: What new market opportunities do you see on the horizon?

Lynne Chamberlain:The industry is our oyster. Open Source is the Industrys software technology of choice.The total package of software includes: security, compliance, a complete stack of products from the OS, Open Stack, Cloud, middleware, storage, etc.

We continue to transform ourselves in order to support our customers and partners.We not only sell software to the IT Folk within the Public Sector but we are strong in our capabilities within the mission critical applications and framework.

As Jim Cramer on MSNBC says, Red Hat is Red Hot!

Read more from the original source:
Executive Spotlight Interview with Lynne Chamberlain, VP of Business Dev. for Red Hat - ExecutiveBiz (blog)