Australia will push “thwarting the encryption of terrorist messaging” at a meeting of the Five Eyes nations in Canada this week.
nsa - News, Features, and Slideshows
nsa in pictures
Cisco is working to build the confidence of prospective customers in its products, two years after the NSA spying disclosures seeded doubt, particularly in China.
The U.S. National Security Agency will lose access to the bulk telephone records data it has collected at the end of November, the Office of the Director of National Intelligence announced Monday.
The Internet is a pit of epistemological chaos. As Peter Steiner posited -- and millions of chuckles peer-reviewed -- in his famous New Yorker cartoon, there's no way to know if you're swapping packets with a dog or the bank that claims to safeguard your money. To make matters worse, Edward Snowden has revealed that the NSA may be squirreling away a copy of some or all of our packets, and given the ease with which it can be done, other countries and a number of rogue hacker groups may very well be following the NSA's lead.
Just as the industry is becoming more comfortable with SDNs, the NSA says it's using them too.
The Information Technology & Innovation Foundation, ranked as the most authoritative science and technology think tank in the U.S. (second in the world behind Max Planck Institutes of Germany), has just released its latest report on the impact of the existence and disclosure of the broad NSA national and international spying programs.
If there's a poster child for the challenges facing open source security, it may be Werner Koch, the German developer who wrote and for the last 18 years has toiled to maintain Gnu Privacy Guard (GnuPG), a pillar of the open source software ecosystem.
As part of the NSA's program to certify commercial off-the-shelf technology for use inside the agency, mobile devices from Samsung and Boeing have been cleared for use by NSA employees.
A funny thing is happening in the wake of the <a href="http://www.computerworld.com/article/2490179/security0/security0-the-snowden-leaks-a-timeline.html">Edward Snowden NSA revelations</a>, the infamous <a href="http://www.computerworld.com/article/2601905/apple-icloud-take-reputation-hits-after-photo-scandal.html">iCloud hack of celebrity nude photos</a>, and the hit parade of customer data breaches at <a href="http://www.computerworld.com/article/2490637/security0/target-finally-gets-its-first-ciso.html">Target</a>, <a href="http://www.computerworld.com/article/2844491/home-depot-attackers-broke-in-using-a-vendors-stolen-credentials.html">Home Depot</a> and the <a href="http://www.computerworld.com/article/2845621/government/us-postal-service-suffers-breach-of-employee-customer-data.html">U.S. Postal Service</a>. If it's not the government looking at your data, it's bored, lonely teenagers from the Internet or credit card fraudsters.
A report Thursday by the Privacy and Civil Liberties Oversight Board calling the NSA's bulk phone records collection program illegal and mostly useless puts the Obama Administration in an awkward spot.
- Nvidia CEO: no plans for more acquisitions after Mellanox deal
- Adobe and Microsoft take on Salesforce's marketing software, with LinkedIn as a weapon
- How data from drivers of Aston Martin Red Bull travels the world
- Asus implements fix for malware attack
- Queensland Govt appoints NextDC to data centre panel
- How to be CMO of a startup, starting up
- How Best Buy shifted from being retail-led to customer relationship driven
- Adobe unveils customer data platform, Commerce Cloud and fresh Ad, Marketing Cloud capabilities
- Report: Top global digital business transformation accelerators named
- Deputy appoints global CMO