NP Staff

Jim Kohlenberger: Cybersecurity Risks Of Encryption Backdoors: What Business Leaders Should Know

The Washington Post reported in February that the U.K. government issued a “secret order” that “demanded that Apple create a back door allowing them to retrieve all the content any Apple user worldwide has uploaded to the cloud.”

While the immediate order is centered on Apple’s cloud data, the U.K.’s order for blanket access to encrypted material raises broader questions about its applicability to other companies and its potential to undermine end-to-end encryption, a critical tool businesses and consumers broadly rely upon today to keep their devices, services and data safe.

Learn More +

Encryption: Your Privacy and Security Matter

If you don’t like prying eyes, but want secure data, listen up. The UK government has ordered a US Tech company to create a backdoor in its cloud infrastructure, weakening end-to-end encryption, the very technology that keeps your data safe. This isn’t just a UK issue.

Learn More +

Experts React to UK Proposal to Destroy Digital Privacy

The Washington Post reported that the United Kingdom Government has secretly ordered Apple to weaken end-to-end encryption for data stored in iCloud, forcing the company to create a backdoor to its fully encrypted data. Once a backdoor is created, it can be exploited by anyone who finds it. If the reporting is accurate, it represents an incredibly dangerous overreach that threatens to put the security of millions of people’s data at risk. 

Learn More +

ADM Michael S. Rogers, USN (ret.) and AMB Jane M. Hardy: Why Competition Laws Could Increase the Risk of Blue Screen Attacks

Today’s digital and technological ecosystem is both more important and more complex than anyone could have imagined even just a few years ago.

People now use connected devices for everything, from paying for their morning coffee to ordering a car, to finding romance. That connectivity, its operating technologies as well as the data it stores and accesses, is also increasingly underpinning our economies and national security. But as we all rely on our connected technologies for more purposes, we also create more vulnerabilities that could lead to disruptions…

Learn More +