article thumbnail

Ubiquitous Surveillance by ICE

Schneier on Security

Report by Georgetown’s Center on Privacy and Technology published a comprehensive report on the surprising amount of mass surveillance conducted by Immigration and Customs Enforcement (ICE).

article thumbnail

Ubiquitous Surveillance by ICE

Security Boulevard

Report by Georgetown’s Center on Privacy and Technology published a comprehensive report on the surprising amount of mass surveillance conducted by Immigration and Customs Enforcement (ICE). The post Ubiquitous Surveillance by ICE appeared first on Security Boulevard.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Highlights from the New U.S. Cybersecurity Strategy

Krebs on Security

” Brian Fox , chief technology officer and founder of the software supply chain security firm Sonatype , called the software liability push a landmark moment for the industry. But back in 2003, most of the world’s companies didn’t host their entire business in the cloud. ” Many of the U.S.

article thumbnail

Attorney General William Barr on Encryption Policy

Schneier on Security

Some hold this view dogmatically, claiming that it is technologically impossible to provide lawful access without weakening security against unlawful access. This is exactly the policy debate we should be having­not the fake one about whether or not we can have both security and surveillance.

article thumbnail

Attorney General Barr and Encryption

Schneier on Security

Some hold this view dogmatically, claiming that it is technologically impossible to provide lawful access without weakening security against unlawful access. This is exactly the policy debate we should be having -- not the fake one about whether or not we can have both security and surveillance.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

As a leading VC, BVP offers budding companies plenty to consider, with a set of roadmaps and tools for today’s technologies and market complexities. Notable cybersecurity exits for the company include AVG Technologies, Cognitive Security, OpenDNS, and Carbon Black. Also read : Addressing Remote Desktop Attacks and Security.

article thumbnail

The Hacker Mind Podcast: Hacking Real World Criminals Online

ForAllSecure

And I remember probably 2000 to 2003 ish, complaining when we when I think it was last year that we were at Alexa, Alexis Park for DEF CON. And we give them different goals and tasks, you know, so some of the things that I do ask for to begin with, like what are you doing in your free time at home with technology?

Hacking 40