More and more companies are using encryption technologies to protect their sensitive data from unauthorized access – but what if the entity that wants to read it is the federal government? You might have wondered whether government agencies can – in both the technological and the legal senses – bypass the encryption you’ve implemented to look at your data? Can they force you to reveal your passwords? Do they have “back doors” built into popular operating systems and programs? If they’re unable to do it in those ways, what workarounds do they use to get a look at information that’s been encrypted? This article outlines some of those methods, as described by representatives of the U.S. Justice department and other agencies. Read about it here:
Netwrix Releases First Ever Hybrid Cloud Visibility Solution
Netwrix Auditor 8.0 enables security threat prevention and increases visibility into data stored both on-premises and in the cloud
How does Windows 10 intrude your privacy?
SoftOrbits is reporting on ways to stop Windows 10 spying on users.
Microsoft might add public-key pinning technology
Public key pinning can help to protect against man-in-the-middle attacks and according to recent reports, Microsoft is considering adding it to IE
Most Devs don’t use a Security Process
According to a study conducted by ComScore and referenced by Microsoft's head of Trustworthy Computing, fewer than half of developers are using a security development…
About The Author
Debra Littlejohn Shinder is a technology and security analyst and author specializing in identity, security and cybercrime, utilizing her past experience as a police officer and police academy/criminal justice instructor. She has written numerous books and articles for web and print publications and has been awarded the Microsoft MVP designation for fourteen years in a row.