Apple makes some beautiful products like its new iPod Nano, but its behavior can be ugly. Thanks to the efforts of the Electronic Frontier Foundation, we can now see documents that pertain to Apple's legal crusade to find out who leaked its alleged trade secrets
Judging by the documents, Apple appears to be more interested in intimidating reporters than in identifying the person or persons responsible for spilling its supposed secrets.
Robin Zonic, the senior manager of investigations in the corporate security department at Apple, testified that he and a colleague interviewed 25 people who had received a computer file believed to be the source of the information. That's not exactly casting a wide net -- the company has more than 13,000 employees. As the EFF notes, "It never took depositions, never issued subpoenas (other than to the journalists), and never asked for signed declarations or information under oath from its own employees."
This is significant because the law requires that Apple conduct an exhaustive search before trying to subpoena journalists.
Perhaps it's naive to expect better behavior from a company that once urged its users to "Think Different." But wouldn't it be something if businesses lived up to their friendly, feel-good marketing messages?
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.