From the moment the RSA Conference 2016 launched, speakers began debating the merits of the Apple/FBI case. Eminent cryptographers, NSA Director Mike Rogers and U.S. Attorney General Loretta E. Lynch all offered related opinions.
A federal magistrate in Brooklyn, N.Y., unlike another judge in California, has denied a request by federal authorities to force Apple to retrieve data from an iPhone, this time in a New York narcotics case.
As the debate intensifies over Apple's refusal to help the FBI crack the iPhone password of one of the San Bernardino shooters, Rep. Will Hurd says Congress should not rush to enact legislation that would require technology companies to weaken encryption. Hurd chairs a subcommittee with cybersecurity oversight.
To boost security and eliminate the need for passwords, MasterCard plans to later this year roll out a facial biometrics app for authentication of online purchases. But some experts warn that biometrics technology is not fool-proof and should only be deployed as part of a layered authentication approach.
Tim Cook says he found out about the court order to help the FBI break into the iPhone of one of the San Bernardino shooters from the press. "I don't think that something so important to this country should be handled that way," the Apple CEO says.
The war of words continues to heat up between the Justice Department and Apple over the FBI's request that the technology provider help it unlock an iPhone seized during the San Bernardino shootings investigation.
By spring, banks and credit unions across the U.S. are expected to start rolling out "card-free" ATMs, offering transactions that experts say will eliminate fraud losses linked to skimming, and at the same time open new doors for mobile payments.
It's the perfect time to debate whether the government should compel Apple to help the FBI circumvent protections blocking access to the San Bernardino shooter's iPhone. Hear Apple CEO Tim Cook, FBI Director James Comey, Sen. Marco Rubio and cryptologist Bruce Schneier in this audio report.
Mobility and IoT are acknowledged by security practitioners to be a whole different beast when it comes to management. MetricStream's French Caldwell says that GRC likewise needs to change its paradigm to accommodate this disruption.
Congressman Will Hurd has a simple request for U.S. government agencies: Have you been using vulnerable Juniper Networks devices? But Congress needs to consider tougher questions about its culpability in this backdoor debacle.
Because of the U.S. migration to EMV, 2016 is expected to be a watershed year for mobile payment adoption, says Randy Vanderhoof of the EMV Migration Forum. Now, he says, the industry should be more focused on new applications hitting the market than on the number of adopters.
The FFIEC's Cybersecurity Assessment Tool is already being integrated into regulators' cybersecurity examinations, says Gartner analyst Avivah Litan. But the tool has so far led to more confusion than clarity, she says, and must be enhanced in 2016.
The top video interviews of the past year featured, among others: Bob Carr of Heartland Payments, Eduardo Perez of Visa and cybersecurity attorney Joseph Burton. Check out their thought-provoking insights.
As it continues to ramp up its cybersecurity enforcement efforts, the FTC could take action next year against consumer wearable device makers if they fail to live up to their promises to protect the privacy of health data and other information, says researcher Stephen Cobb, who also expects scrutiny from the FDA.