Remove Encryption Remove Risk Remove Surveillance Remove Telecommunications
article thumbnail

Attorney General William Barr on Encryption Policy

Schneier on Security

Yesterday, Attorney General William Barr gave a major speech on encryption policy -- what is commonly known as "going dark." But, in the world of cybersecurity, we do not deal in absolute guarantees but in relative risks. I served for many years as the general counsel of a large telecommunications concern.

article thumbnail

Attorney General Barr and Encryption

Schneier on Security

Last month, Attorney General William Barr gave a major speech on encryption policy­what is commonly known as "going dark." But, in the world of cybersecurity, we do not deal in absolute guarantees but in relative risks. I served for many years as the general counsel of a large telecommunications concern.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5G Security

Schneier on Security

The security risks inherent in Chinese-made 5G networking equipment are easy to understand. Eavesdropping is also a risk, although efforts to listen in would almost certainly be detectable. Susan Gordon, then-U.S. Indeed, the United States needs to accept 5G's insecurities and build secure systems on top of it.

article thumbnail

Privacy and Your Browser History: Should You Care?

SecureWorld News

And a recent bill approved by the United States Senate, the USA Freedom Act, might put the privacy of this data at risk—and make it readily available without a warrant. Telecommunications metadata 2. The US Senate voted to renew the USA Freedom Act which authorizes a variety of forms of national surveillance. Ron Wyden and Sen.

article thumbnail

Advanced threat predictions for 2024

SecureList

However, instead of encrypting the data, it purposefully destroyed it in the affected systems. It determined that the injection point was situated within the connection between two Egyptian telecommunication providers. iOS devices may not be the only targets: other devices and operating systems could also face risks.

Hacking 110
article thumbnail

Top VC Firms in Cybersecurity of 2022

eSecurity Planet

Company Sector Year Status Vicarius Vulnerability management 2022 Private Dragos ICS and OT security 2021 Private Safeguard Cyber Risk management 2021 Private CyberGRX Risk management 2019 Private Signifyd Fraud protection 2018 Private RedOwl Security analytics 2015 Acquired: Forcepoint. AllegisCyber Investments. BVP Investments.