FBI's Ability To Crack iPhones Raises More Questions
The FBI, with its newfound hack, has agreed to unlock other iPhones. While the dispute with Apple is off the front burner for now, the company is still facing other legal challenges, including one case in Brooklyn. Serious legal and technical questions linger.
How The Network Time Foundation Uses Its Funding
The Network Time Foundation saw a big jump in funding in 2015. While it's a step in the right direction, there's still much work ahead to shore up the open source Network Time Protocol (NTP) that synchronizes computer clocks around the world. Here's where the money is going, and what's still needed.
Harlan Stenn Tackles NTP Security Issues As Big Move Looms
There's not a business in existence today whose operations don't rely on the Network Time Protocol (NTP). Harlan Stenn is the chief maintainer of NTP. In the past year, security researchers have raised a number of concerns about the protocol, which Stenn is addressing even as he prepares a move of half the NTP infrastructure. Here's why it matters.
Apple, FBI Head Into Court March 22
The FBI's Feb. 16 court order citing the All Writs Act and demanding Apple's cooperation in unlocking an iPhone will go before a judge March 22, after more than a month of global attention and a day after a press event at Apple Headquarters.
Barry University CIO: Managing The Mobile Security Load
In higher ed, CIOs have to deal with ultra-connected students and faculty whose devices increase the security burden on IT, while managing the growing use of online video as an educational tool. Here's how the CIO of Barry University in Florida handles it all.
Apple Engineers Could Quit Over iPhone Encryption Case
Several Apple engineers have told the New York Times that they'd consider leaving one of the industry's most prized companies and positions rather than be made to create a so-called GovtOS to crack the iPhone's encryption technology.
IoT Security Could Crack Quickly In The Quantum Era
Internet of Things security is only beginning to get serious attention. However, it might already be too late. In the era of quantum computing, the fragile security that protects IoT devices may crumble faster than you think.
10 Cloud Startups Worth Your Attention
If your view of the cloud marketplace is dominated by the Amazons and Googles of the world, you may be missing out on solutions that better target your needs. Here's our list of 10 up-and-coming cloud providers worth a look.
Google Traffic Is 77% Encrypted
Google, however, notes improvement is still needed on its own products and services. Gmail encryption support is 100%, but these other products and services fall short.
Apple Legal Filing: 'The Founders Would Be Appalled'
Apple filed another legal brief March 15 in its fight with the FBI and DOJ. The iPhone maker is fighting efforts to give up its source code, and several tech and security experts agree, calling the government's request "potentially cataclysmic."
iPhone Encryption Battle: What Apple Can Learn From BlackBerry
BlackBerry was the preferred smartphone for business users a mere five years ago, until the company decided to allow certain governments to access user messages. Apple could face the same confidence loss from corporate customers if the company assists the FBI to crack the security of the iPhone.
9 Hot Big Data And Analytics Startups To Watch
Hadoop recently celebrated its 10th birthday, advanced analytics have become even more sophisticated, and a plethora of startups have arisen to help organizations wrangle all the data and pull out insights. With all that in mind, here are nine big data and analytics startups to watch.
iPhone Encryption Battle: Feds Launch Latest Salvo
The government's impatience is evident in its third filing asking for Apple's cooperation in unlocking the iPhone used by one of the San Bernardino terrorists. The document is a point-by-point rebuttal that reads like the government taking a final, very deep breath before it completely loses its temper.
US Anti-Encryption Legislation Is Imminent: Report
US Senators Feinstein and Burr are preparing legislation that would punish tech companies that refuse to cooperate with investigators, Reuters reports. French lawmakers recently backed a similar mandate that goes one step further by threatening jail time for execs who don't cooperate with law enforcement.
FBI Changes How It Uses NSA Data: Report
With calls for greater transparency in the rules governing Section 702 of the NSA's Prism program, the FBI has made classified changes, The Guardian confirmed. The program has implications for businesses and individuals alike.
How Stryker's First-Ever CISO Reined In Cloud Chaos
From her post as deputy CIO of The White House to being named the first-ever CISO at Stryker, a medical device manufacturer, Alissa Johnson is no stranger to challenges. Here's a look at how she reined in an environment loaded with cloud applications and shadow IT.
IoT Security: Industry Finally Waking Up To The Dangers
For the last several years, Internet of Things security has been one of the most hotly debated topics at Mobile World Congress. This year, however, IoT security took on a new sense of urgency as more devices are being connected and the technology turns mainstream.
Healthcare.gov: Hard-Earned Lessons For CIOs
It's been just over two years since the controversial and troubled launch of Healthcare.gov, a marquee project for a new age of digital government, implementing a politically controversial policy of affordable healthcare insurance for everyone. As of today more than 6 million people have been enrolled through this system. InformationWeek caught up with Healthcare.gov's technology lead to talk about lessons learned.
HPE Fortifies Security For Mobile And Enterprise
HPE Security is looking to improve the security of mobile devices and the enterprise overall with two new security offerings announced in conjunction with the RSA Conference. HPE also released its Cyber Risk Report 2016.