Security

DMA: To Preserve Robust Mobile Security, Policymakers Should Heed the Important Security Lessons From the ActiveX Era of the Internet

We’ve previously explained the many challenges European regulators face in implementing the Digital Markets Act (DMA), especially as it relates to the security consequences of downloading mobile apps from untrusted sources. In this piece, we go deeper to examine lessons from a similar well-meaning approach and architecture from the 1990’s — a technology framework called ActiveX that enabled software applications to be downloaded from third-party sources to bridge the gap that separated web pages from Microsoft’s operating system.

Learn More +

Adam Golodner: Global trust and technology networks: Beware the trifurcation

Recently, I attended the annual Munich Security Conference and came away with a deepening concern about what I’m calling the “trifurcation” of the global technology ecosystem. The trifurcation is a further balkanization of the technology ecosystem as the West and China pull away from each other’s products and services, which is causing a bifurcation of global networks and data flows.

Learn More +

Our CISA Zero Trust Comment

We share the view that mobile devices “present unique opportunities and challenges in adopting comprehensive zero trust models” and applaud CISA’s efforts to advance ZT from a mobile device perspective – especially given the dynamically changing and critical mobile threat environment. As mobile devices become even more essential to the way the government works, the way federal workers do their jobs, and the way agencies deliver services, it’s become even more essential that leaders incorporate proven trustworthy principles in their enterprise mobility strategies,

Learn More +

Adam Golodner: More Than Ever, Security Matters

Current headlines remind us that security matters, in all of its forms. Top of mind for those of us in the cybersecurity community is whether critical infrastructure functions, defense forces can communicate, citizens are accessing truthful information, and the technology underpinnings of economic and national security can be trusted and are available.

Learn More +