article thumbnail

Cybersecurity Report: June 29, 2015

SiteLock

According to Wikileaks, the whistleblower website, the US National Security Agency (NSA) has been spying on French President Jacques Chirac, Nicolas Sarkozy and Francois Hollande in 2006-2012, Wikileaks says. These files were said to derive from directly targeted NSA surveillance of the communications of multiple French leaders.

article thumbnail

Attorney General William Barr on Encryption Policy

Schneier on Security

But, in the world of cybersecurity, we do not deal in absolute guarantees but in relative risks. This is exactly the policy debate we should be havingĀ­not the fake one about whether or not we can have both security and surveillance. Barr makes the point that this is about "consumer cybersecurity," and not "nuclear launch codes."

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Attorney General Barr and Encryption

Schneier on Security

But, in the world of cybersecurity, we do not deal in absolute guarantees but in relative risks. This is exactly the policy debate we should be having -- not the fake one about whether or not we can have both security and surveillance. Barr makes the point that this is about "consumer cybersecurity" and not "nuclear launch codes."

article thumbnail

Spotlight Podcast: Dr. Zulfikar Ramzan on RSAā€™s Next Act: Security Start-Up

The Security Ledger

Thirty eight years after it was founded, RSA Security is embarking on what may be its most challenging journey yet: cybersecurity startup. » Related Stories Spotlight Podcast: Taking a Risk-Based Approach to Election Security How NIST Is Securing The Quantum Era Episode 188: Crowdsourcing Surveillance with Flock Safety. . »

article thumbnail

Spotlight Podcast: CTO Zulfikar Ramzan on RSAā€™s Next Act: Security Start-Up

The Security Ledger

Thirty eight years after it was founded, RSA Security is embarking on what may be its most challenging journey yet: cybersecurity startup. » Related Stories Spotlight Podcast: Taking a Risk-Based Approach to Election Security How NIST Is Securing The Quantum Era Episode 188: Crowdsourcing Surveillance with Flock Safety. . »

article thumbnail

The Origins and History of the Dark Web

Identity IQ

Law enforcement agencies and cybersecurity experts actively monitor the dark web to look for lawbreakers. In 2006, several of the same scientists who developed Tor founded the Tor Project, a Massachusetts-based non-profit organization. Navy patented onion routing in 1998.

article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Achieving funding is no simple task, and cybersecurity entrepreneurs have a difficult path competing in a complex and competitive landscape. Luckily for cybersecurity startups, there’s no shortage of interest in tomorrow’s next big security vendors. Investments in cybersecurity more than doubled from $12 billion to $29.5