Reddit’s Missing Warrant Canary: What IT Can Learn
It's tricky trying to figure out whether or not your preferred app, website, or service provider has received a federal subpoena demanding information. When a warrant canary vanished from Reddit's Transparency Report, it got folks talking. The incident holds important lessons for enterprise IT professionals trying to decipher whether or not a service provider's data is being trolled by the feds.
IBM's Strategy Fails To Boost Revenue, Impress Investors
IBM embarked on its first quarter breaking out "strategic imperatives," as part of an effort to showcase businesses such as cognitive computing that the company believes will shape its future. Yet, overall IBM's revenue experienced a decline compared to last year's first quarter.
Insider Security Threats: Disloyal Employees
One in five employees is willing to leak confidential information, and 30% of them say that they will sell their work-related passwords for less than $1,000, according to Sailpoint 2016 Market Pulse Survey findings. The release of the Panama Papers is adding to the debate.
FBI's Ability To Crack iPhones Raises More Questions
The FBI, with its newfound hack, has agreed to unlock other iPhones. While the dispute with Apple is off the front burner for now, the company is still facing other legal challenges, including one case in Brooklyn. Serious legal and technical questions linger.
iOS SideStepper Vulnerability Undermines MDM Services: Check Point
Security researchers from Check Point plan to disclose a flaw at the Black Hat Asia conference which they claim endangers the way mobile device management software interacts with iPhones and iPads. Check Point calls the vulnerability "SideStepper" because it sidesteps the normal app approval process.
Harlan Stenn Tackles NTP Security Issues As Big Move Looms
There's not a business in existence today whose operations don't rely on the Network Time Protocol (NTP). Harlan Stenn is the chief maintainer of NTP. In the past year, security researchers have raised a number of concerns about the protocol, which Stenn is addressing even as he prepares a move of half the NTP infrastructure. Here's why it matters.
Apple, FBI Head Into Court March 22
The FBI's Feb. 16 court order citing the All Writs Act and demanding Apple's cooperation in unlocking an iPhone will go before a judge March 22, after more than a month of global attention and a day after a press event at Apple Headquarters.
Apple Engineers Could Quit Over iPhone Encryption Case
Several Apple engineers have told the New York Times that they'd consider leaving one of the industry's most prized companies and positions rather than be made to create a so-called GovtOS to crack the iPhone's encryption technology.
Google Traffic Is 77% Encrypted
Google, however, notes improvement is still needed on its own products and services. Gmail encryption support is 100%, but these other products and services fall short.
Apple Legal Filing: 'The Founders Would Be Appalled'
Apple filed another legal brief March 15 in its fight with the FBI and DOJ. The iPhone maker is fighting efforts to give up its source code, and several tech and security experts agree, calling the government's request "potentially cataclysmic."
iPhone Encryption Battle: What Apple Can Learn From BlackBerry
BlackBerry was the preferred smartphone for business users a mere five years ago, until the company decided to allow certain governments to access user messages. Apple could face the same confidence loss from corporate customers if the company assists the FBI to crack the security of the iPhone.
9 Hot Big Data And Analytics Startups To Watch
Hadoop recently celebrated its 10th birthday, advanced analytics have become even more sophisticated, and a plethora of startups have arisen to help organizations wrangle all the data and pull out insights. With all that in mind, here are nine big data and analytics startups to watch.
US Anti-Encryption Legislation Is Imminent: Report
US Senators Feinstein and Burr are preparing legislation that would punish tech companies that refuse to cooperate with investigators, Reuters reports. French lawmakers recently backed a similar mandate that goes one step further by threatening jail time for execs who don't cooperate with law enforcement.
FBI Changes How It Uses NSA Data: Report
With calls for greater transparency in the rules governing Section 702 of the NSA's Prism program, the FBI has made classified changes, The Guardian confirmed. The program has implications for businesses and individuals alike.
IoT Security: Industry Finally Waking Up To The Dangers
For the last several years, Internet of Things security has been one of the most hotly debated topics at Mobile World Congress. This year, however, IoT security took on a new sense of urgency as more devices are being connected and the technology turns mainstream.
HPE Fortifies Security For Mobile And Enterprise
HPE Security is looking to improve the security of mobile devices and the enterprise overall with two new security offerings announced in conjunction with the RSA Conference. HPE also released its Cyber Risk Report 2016.
Apple Preparing Enhanced iPhone Security, NYT Reports
The struggle between Apple, the FBI and the US Justice Department speaks to a need for critical discussions about the ramifications and rules in a changing world. The New York Times reports Apple is looking to make it even harder to crack the iPhone's security, while CEO Tim Cook continues to defend his company.
iPhone Encryption: 5 Ways It's Changed Over Time
Apple's battle with the FBI has put iPhone encryption in the spotlight. However, some might be surprised that the company's encryption efforts have evolved slowly and are not that different from those of other smartphone makers. Here's a look at the 5 phases of the process so far.
Security Concerns Continue Amid Cloud Adoption
While most top IT executives at companies of all sizes continue to express concern about the security of data in the cloud, that hasn't slowed their move to embrace this new infrastructure as a home for corporate data. A new survey and report reveal their top security nightmares and provides some recommendations about how to protect data in the cloud.