Bjorn Aannestad, Business 2 Community, Friday, September 23, 2016
Robin Wilton Interview: Robin is technical outreach director for identity and privacy in the Internet Society’s Internet Technology Office. He is a specialist in digital identity, IT security and public policy and is a member of the Kantara Initiative’s Board of Trustees. Robin also worked as a research analyst on Gartner’s Identity and Privacy Strategies team.
Fortunato Guarino, SC Magazine, Thursday, September 15, 2016
Any new regulation brings an inherent risk of non-compliance. To avoid issues, organisations need to understand exactly where any sensitive data is stored. Unfortunately, this is usually much easier said than done. The exponential increase in the amount of data produced makes answering even basic questions about how information is created, stored and managed difficult for many businesses to answer. This lack of insight creates a tremendous amount of risk. However, there are steps organisations can take to better manage data, reducing their risk of non-compliance, and mitigating potential damages in the event of a cyber-attack. The process starts with knowing which questions to ask.
Liam Tung, ZDNet, Wednesday, September 7, 2016
Microsoft has officially opened two new cloud regions, offering Azure and Office 365 from multiple datacenter locations in the UK for the first time. The new UK regions take to 28 the number of Microsoft generally-available regions for its cloud infrastructure and platform services. For UK enterprise customers, the regional services are also designed to provide a better option for meeting requirements to store certain data locally. The new cloud areas are made up of UK West and UK South, served from datacenters in London and Cardiff, the capital of Wales.
Tuesday, September 6, 2016
After a recent federal court ruling against prosecutors seeking emails stored abroad, a new case in Virginia again highlights the clash between privacy rights and data sovereignty
Eric Peters, Inside Sources, Tuesday, September 6, 2016
James Bond had it wrong — diamonds aren’t forever. Data is. Its privacy ought to be, too. Unfortunately, laws regarding who may access your data, how it’s accessed — and when — haven’t caught up to data storage technology.
Jena McGregor, Washington Post, Monday, August 22, 2016
Just after Apple disclosed those results, Cook sat down with The Washington Post to discuss his first five years in one of Corporate America’s most glaring spotlights. In two sprawling and highly self-reflective interviews — one in his office and another by phone just before he left for vacation in Yellowstone and Grand Teton National Parks — Cook described why the visibility of the job has been “shocking,” how he’s learned to deal with the scrutiny, and who he’s turned to for advice at pivotal moments...
Richard Stiennon, Information Security Buzz, Friday, August 19, 2016
The EU Commission has confirmed its desire to bring in more regulation for online messaging services such as WhatsApp and Skype in an attempt to safeguard users’ privacy. Richard Stiennon, Chief Strategy Officer, Blancco Technology Group commented below.
Jim Bronskill, Toronto Star, Thursday, August 18, 2016
The Canadian Association of Chiefs of Police has passed a resolution calling for the legal measure to unlock digital evidence, saying criminals increasingly use encryption to hide illicit activities. There is nothing currently in Canadian law that would compel someone to provide a password to police during an investigation, RCMP Assistant Commissioner Joe Oliver told a news conference Tuesday. Oliver said criminals — from child abusers to mobsters — are operating online in almost complete anonymity with the help of tools that mask identities and messages, a phenomenon police call “going dark.” “The victims in the digital space are real,” Oliver said. “Canada’s law and policing capabilities must keep pace with the evolution of technology.”
Nathan Leamer, R Street, Thursday, August 18, 2016
We at the R Street Institute support strong encryption and have warned about the consequences of efforts to undermine this essential security tool through government-mandated backdoors, compelled assistance or other means. A similar position was reiterated by Apple CEO Tim Cook in his February “letter to customers” that clarified the company’s defense of encryption.
Colin Poltras, UConn, Thursday, August 18, 2016
In a new study by a UConn communication professor and co-authors, hundreds of university students agreed to give up their first-born child and turn their personal data over to the National Security Agency in return for access to what they thought was a new social networking site. “The privacy paradox is basically the idea that we say one thing and do another when it comes to privacy,” says Oeldorf-Hirsch. “Individuals may state that privacy is important and that they are interested in protecting their information, but their behavior does not corroborate those intentions. People generally share more information or share it more widely than they claim to.”