Security

Jim Kohlenberger: Cybersecurity Risks Of Encryption Backdoors: What Business Leaders Should Know

The Washington Post reported in February that the U.K. government issued a “secret order” that “demanded that Apple create a back door allowing them to retrieve all the content any Apple user worldwide has uploaded to the cloud.”

While the immediate order is centered on Apple’s cloud data, the U.K.’s order for blanket access to encrypted material raises broader questions about its applicability to other companies and its potential to undermine end-to-end encryption, a critical tool businesses and consumers broadly rely upon today to keep their devices, services and data safe.

Learn More +

The Global IT Crisis and Third Party Vulnerabilities

This week’s global IT crisis affecting businesses around the world should be a wake up call to us all.  DMA requirements for mandatory third party access to the operating system will make personal smartphones and tablets vulnerable to new and currently unimaginable emerging threats.

Learn More +

Taking Spyware and Other Mobile Threats Seriously

Last March, in the forward to the White House Cybersecurity strategy, the President wrote, “[W]hen we pick up our smart phones to keep in touch with loved ones, log on to social media to share our ideas with one another, or connect to the Internet to run a business, we need the ability to trust that the underlying digital ecosystem is safe, reliable, and secure.”

Learn More +

DMA: To Preserve Robust Mobile Security, Policymakers Should Heed the Important Security Lessons From the ActiveX Era of the Internet

We’ve previously explained the many challenges European regulators face in implementing the Digital Markets Act (DMA), especially as it relates to the security consequences of downloading mobile apps from untrusted sources. In this piece, we go deeper to examine lessons from a similar well-meaning approach and architecture from the 1990’s — a technology framework called ActiveX that enabled software applications to be downloaded from third-party sources to bridge the gap that separated web pages from Microsoft’s operating system.

Learn More +

Adam Golodner: Global trust and technology networks: Beware the trifurcation

Recently, I attended the annual Munich Security Conference and came away with a deepening concern about what I’m calling the “trifurcation” of the global technology ecosystem. The trifurcation is a further balkanization of the technology ecosystem as the West and China pull away from each other’s products and services, which is causing a bifurcation of global networks and data flows.

Learn More +