NP Staff
James Lamond: Transatlantic Consensus That Private Sector Is Key To Addressing Cyber Concerns
By any account, the transatlantic relationship appears to be at a low point. From trade and economics to matters of war and peace, the United States and Europe are in an apparent period of disunity not seen in decades.
However, there is one area where there appears to be more alignment than one might expect: cybersecurity.
The EU Takes Another Step Back on Privacy and Security
As we warned they might do, today, under the guise of advancing interoperability, EU regulators have taken another major step backwards when it comes to
Encryption: Your Privacy and Security Matter
If you don’t like prying eyes, but want secure data, listen up. The UK government has ordered a US Tech company to create a backdoor in its cloud infrastructure, weakening end-to-end encryption, the very technology that keeps your data safe. This isn’t just a UK issue.
Experts React to UK Proposal to Destroy Digital Privacy
The Washington Post reported that the United Kingdom Government has secretly ordered Apple to weaken end-to-end encryption for data stored in iCloud, forcing the company to create a backdoor to its fully encrypted data. Once a backdoor is created, it can be exploited by anyone who finds it. If the reporting is accurate, it represents an incredibly dangerous overreach that threatens to put the security of millions of people’s data at risk.
New Interoperability Mandates Exemplify the Problems with DMA Rather Than Fixing Them
Many people may have missed it, but just ahead of the holidays, the European Commission proposed specific new interoperability mandates under the Digital Markets Act
ADM Michael S. Rogers, USN (ret.) and AMB Jane M. Hardy: Why Competition Laws Could Increase the Risk of Blue Screen Attacks
Today’s digital and technological ecosystem is both more important and more complex than anyone could have imagined even just a few years ago.
People now use connected devices for everything, from paying for their morning coffee to ordering a car, to finding romance. That connectivity, its operating technologies as well as the data it stores and accesses, is also increasingly underpinning our economies and national security. But as we all rely on our connected technologies for more purposes, we also create more vulnerabilities that could lead to disruptions…
The Global IT Crisis and Third Party Vulnerabilities
This week’s global IT crisis affecting businesses around the world should be a wake up call to us all. DMA requirements for mandatory third party access to the operating system will make personal smartphones and tablets vulnerable to new and currently unimaginable emerging threats.
James Lamond: Why Cybersecurity Is Key To Solving Global Crises
Today’s global security environment is rapidly changing and is infinitely more complex than in years past. The challenges, at times, appear to be insurmountable, but innovation and creative uses of new technologies may very well be part of the calculus to help address them.