Enacting legislation to compel tech companies to help law enforcement decrypt data on mobile devices would diminish America's standing as a moral leader in the world, a nation looked up to by billions of people, even with our many flaws.
The scant - if not conflicting - details and sourcing attached to a recent news report on how the FBI cracked an iPhone 5c have left information security experts questioning both technical details and related agendas.
New guidance from the National Institute of Standards and Technology could help make it easier and less expensive for organizations to encrypt and decrypt some forms of data, including Social Security and credit card numbers.
The massive 'Panama Papers' leak demonstrates how law firms are at risk from internal and external attackers seeking to access confidential information. Experts offer insights on how these firms, and others, can better defend their clients' secrets.
The massive "Panama Papers" data leak apparently was enabled by a law firm failing to have the right information security defenses in place. The breach calls attention to the need for all organizations to encrypt sensitive data, use access controls as well as monitor access patterns for signs of data exfiltration.
Fear Not the Breach: encryption offers the best protection for your critical data in the event of a breach. As threats and hackers get more effective, make sure your data remains safe.
This buyers guide details the factors you should consider when
evaluating the different encryption tools. Its goal is to help you...
Data breaches are not just for big business. With 74% of small businesses had a security breach in 2015, many still don't use encryption, worried it will be too difficult, expensive or slow down machines.
Download this white paper to:
Debunk the top encryption myths
Learn how businesses of all sizes can...
Security professionals trust encryption to protect data and meet regulatory requirements. Forrester conducted a 52 point criteria evaluation of the leading endpoint encryption vendors, and named Sophos Safeguard Encryption "breakout star."
Download this report for a comparison of competing vendors including...
Tools and techniques need to be identified to aid law enforcement in gathering evidence from devices, such as smartphones, while safeguarding the security and privacy of individuals. Can stakeholders find that middle ground?
We've all heard about Apple's refusal to comply with a court order to assist the FBI in bypassing security features built into an iPhone that was issued to a San Bernardino shooter. The resulting debate - and the implications for law enforcement, national security, privacy and personal freedom - have led to serious,...
The adoption of encrypted Internet traffic has exploded in recent years due to security and privacy concerns. Today, it is estimated that more than 65% of Internet traffic will be encrypted by the end of 2016. This increase in encrypted traffic has created a more secure exchange of data"but it has also created a space...
Despite the recent move to put the FBI-obtained court order against Apple on hold, the crypto debate is far from over, said a panel of law enforcement, legal and industry experts at Information Security Media Group's Fraud and Breach Prevention Summit in San Francisco.
Neither the FBI nor Apple looks good in the days following the postponement of a hearing on whether Apple should be forced to help the bureau crack open the iPhone of one of the San Bernardino shooters. The FBI's credibility is being questioned as Apple's security technology is being tarnished.
In many enterprises, the CISO reports to the CIO, and occasionally you find a CIO who reports to the CISO. But Venafi's Tammy Moskites holds both roles. How does she manage the natural tension between IT and security?
The PCI Security Standards Council envisions a single, globally-unified data security standard. Now that the European Card Payment Association is a strategic regional member, that goal is significantly closer, says Jeremy King, the council's international director.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.