At the end of 2018, Australia became the first nation in the world to enact encryption laws requiring companies to provide access to encrypted communications. Will other nations around the world soon follow suit?
Quora suffered a massive data leak, exposing their password database with 100 million passwords. But the passwords were securely stored and are next-to-useless to criminals.
Marriott has put half a billion guest at risk in one of the largest data breach to date. The scope of the data breach is not only startling due to the numbers of guests that have been affected, it is the sheer amount of time since 2014 that the hackers had had access to the data.
The Five Eyes proposal for lawful access compromises on encryption, infringes upon our right to privacy, puts our personal data at risk, and utlimately undermines public trust in technology.
The Five Eyes has put the tech industry on notice. They want access to data from tech companies and while there is no formal demand for encryption backdoors, the Five Eyes believe government agencies should have access to encrypted information.
Secure messaging apps can provide a great means of communicating securely and privately, but there's a privacy dilemma as law enforcement and national security agencies face significant obstacles to the lawful access of communications.
Are the privacy and data misuse scandals finally catching up with Facebook stock? There are lessons every business should heed to avoid a direct and shocking blow to company value.
Proposed Secure Data Act wants to forbid government agencies from demanding for encryption backdoors. This is a positive move but will it resolve the security vs. privacy debate?
Today’s heightened threat level imposes responsibilities on both sides of the equation: Cloud service providers must continually evaluate their security posture to offer rigorous protection to customers. And leaders protecting their organization must choose the solution that best meets their unique security needs.
There is reason to be optimistic about the future of cyber security. In today’s world, there is always a “weak link” in the chain that hackers can exploit. In a blockchain world, there are no longer any weak links and every action taken on the blockchain is part of a completely verifiable and trackable digital ledger.