Privacy and Personal Security

Jim Kohlenberger: Cybersecurity Risks Of Encryption Backdoors: What Business Leaders Should Know

The Washington Post reported in February that the U.K. government issued a “secret order” that “demanded that Apple create a back door allowing them to retrieve all the content any Apple user worldwide has uploaded to the cloud.”

While the immediate order is centered on Apple’s cloud data, the U.K.’s order for blanket access to encrypted material raises broader questions about its applicability to other companies and its potential to undermine end-to-end encryption, a critical tool businesses and consumers broadly rely upon today to keep their devices, services and data safe.

Learn More +

Encryption: Your Privacy and Security Matter

If you don’t like prying eyes, but want secure data, listen up. The UK government has ordered a US Tech company to create a backdoor in its cloud infrastructure, weakening end-to-end encryption, the very technology that keeps your data safe. This isn’t just a UK issue.

Learn More +

Taking Spyware and Other Mobile Threats Seriously

Last March, in the forward to the White House Cybersecurity strategy, the President wrote, “[W]hen we pick up our smart phones to keep in touch with loved ones, log on to social media to share our ideas with one another, or connect to the Internet to run a business, we need the ability to trust that the underlying digital ecosystem is safe, reliable, and secure.”

Learn More +