Surviving Contact with the Enemy

Strategy without the ability to execute is destined to fail, and execution without forethought will face the same fate.
Most individuals find it difficult to think in terms of direction and action, so what happens when you have to juggle the two priorities? How do security executives strike the right balance, while aligning to business priorities, operational capabilities and their threats?
read more

Continue reading

US Govt Says May Not Need Apple Help in iPhone Battle

The US government said Monday it may have found a way to access the iPhone of one of the San Bernardino attackers without Apple's help, possibly avoiding a showdown with the tech giant.
On Sunday, "an outside party demonstrated to the FBI a possible method for unlocking Farook's iPhone," Justice Department attorneys said in a court filing.
read more

Continue reading

FBI May Not Need Apple’s Help to Crack iPhone

The US government said Monday it may have found a way to crack the iPhone of one of the San Bernardino attackers without Apple's help, possibly avoiding a showdown with the tech giant.
In a court filing, federal prosecutors said that on Sunday, an unidentified "outside party" had demonstrated to the FBI a possible way to unlock Syed Farook's iPhone.
read more

Continue reading

Researchers Find Flaw in Apple Encryption

Researchers discovered an encryption vulnerability affecting multiple Apple products, including the company’s instant messaging application iMessage.
A research team from Johns Hopkins University, led by cryptography expert Matthew Green, reported finding a flaw in Apple’s encryption that can be exploited to access encrypted photos and videos sent via iMessage.
read more

Continue reading