Government Experts in the U.S.: Don’t Sideload
Consumers download millions of mobile apps each year because they trust that the apps available on app stores have been vetted for malware, comply with
What we’ve been working on.
Consumers download millions of mobile apps each year because they trust that the apps available on app stores have been vetted for malware, comply with
While privacy and competition law pursue different goals, they can exist harmoniously under the right regulatory paradigm. Both areas of law,
Trusted Future believes it is critical for the information infrastructure of today, and obtaining the benefitsof the emerging technology of tomorrow, to have a vibrant digital ecosystem that is trusted, responsible, inclusive, and safe — one where you can trust that your privacy will be protected, your data will be secured, your safety can be guaranteed, and that advancements in technology will lead to a more just, equitable and inclusive society.
This op-ed was originally published in Protocol. By Edward “Smitty” Smith When the world came undone in March 2020, technology made the impossible possible, at
At a time of increasing global tensions, our national security experts are warning that cybersecurity threats from authoritarian regimes are on the rise. We examine the heightened threat and highlight critical steps that businesses, tech users, and policymakers should take in this new environment.
Survey shows Americans trust U.S. companies – and device manufacturers in particular – most to close the technology trust gap and want government to support tech innovation and global competitiveness without additional mandates and regulation
Innovation is the key to economic growth, improved standards of living, opportunities for all Americans and even America’s strength on the world stage. At time when Washington is almost defined by hyper-partisanship, one of the few areas where there is real, meaningful bipartisan agreement is on the pending Bipartisan Innovation Act.
We share the view that mobile devices “present unique opportunities and challenges in adopting comprehensive zero trust models” and applaud CISA’s efforts to advance ZT from a mobile device perspective – especially given the dynamically changing and critical mobile threat environment. As mobile devices become even more essential to the way the government works, the way federal workers do their jobs, and the way agencies deliver services, it’s become even more essential that leaders incorporate proven trustworthy principles in their enterprise mobility strategies,
Current headlines remind us that security matters, in all of its forms. Top of mind for those of us in the cybersecurity community is whether critical infrastructure functions, defense forces can communicate, citizens are accessing truthful information, and the technology underpinnings of economic and national security can be trusted and are available.
As science and technology become more intertwined, it is increasingly essential that technical integrity principles be elevated alongside scientific integrity principles. This will ensure that policy decisions are made on the basis of the best available engineering and technical expertise, data, and evidence.