Sindu Mv, YourStory.com, Monday, May 2, 2016
A trusted Cloud partner bridges the gap between innovation and security concerns. The right partner, technology, and processes, can help the most complex enterprise move to the Cloud with confidence. Against this backdrop, Microsoft brought together eminent security leaders for an exclusive event on April 20, to help organisations in India understand cyber risks based on industry standards and to remediate current security gaps. The summit reiterated Microsoft’s commitment to helping organisations deal with security challenges. Leaders including; Capt. Raghu Raman, President Risk, Security & New Ventures – Reliance Industries and former CEO of NATGRID; Burgess Cooper, Partner – Information & Cyber Security – E&Y, spoke extensively on cyber security. Kevin Turner set the tone of the summit with his keynote address, highlighting how we are a part of the fourth industrial revolution and how digital disruption is driving massive business disruption. He also emphasised how Microsoft is differentiating with security and privacy.
Mark Sullivan, Fast Company, Monday, May 2, 2016
The court made changes to the Federal Rules of Criminal Procedure that will allow U.S. law enforcement to remotely hack and search computers of unknown location, computers whose location has been obscured by digital means, and even computers of cybercrime victims. The European Union has been extremely sensitive to U.S. government cybersurveillance since Edward Snowden revealed massive government surveillance programs in 2013. On Thursday, the Supreme Court gave federal agencies far wider latitude to hack and search into computers around the world, and the decision could have a chilling effect on digital trade relations between the U.S. and Europe. The court made changes to the Federal Rules of Criminal Procedure that will allow U.S. law enforcement to remotely hack and search computers of unknown location, computers whose location has been obscured by digital means, and even computers of cybercrime victims. The European Union has been extremely sensitive to U.S. government cybersurveillance since Edward Snowden revealed massive government surveillance programs in 2013. The warrant rules changes Thursday could revive those fears, and endanger a painstakingly struck Safe Harbor agreement between the U.S. Commerce Department and the European Commission. The two sides agreed on a legal framework for a new Safe Harbor agreement February 2, but that framework still awaits final approval by the E.U.
George Lynch, Bloomberg BNA, Monday, May 2, 2016
The catchphrase “do as I say, not as I do,” seems appropriate to some for how the European Union approaches government surveillance of personal data in the U.S. versus the EU. In response to terrorism and refugee concerns, some EU member states have been passing laws to give their law enforcement and national security officials easier access to personal data. At the same time some EU officials continue to voice objections to U.S. efforts to do the same. Throughout it all, companies have begun to worry that these new EU surveillance laws might affect data sharing within Europe and their ability to maintain the trust of privacy-minded customers, attorneys and analysts told Bloomberg BNA.
James Nunns, CBR, Friday, April 29, 2016
Security continues to be a hot topic for public cloud vendors as concerns around meeting regulatory demands, and securing data against breaches remain a core consideration around whether or not to move to the cloud. As vendors such as Microsoft create more cloud-based services it is necessary for them to prove the security of them. Both Microsoft and Google have received boosts in this area by achieving certifications for security and privacy standards. Microsoft for starters, has revealed that its Azure ML service for predictive analytics with machine learning has achieved the standard ISO 27001 and the EU Model Clauses, as well as others.
Bob Kirby, FedTech, Friday, April 29, 2016
By embracing a hybrid clouds, agencies can put highly sensitive information in private clouds while using public clouds for low-cost storage.
Josh Jaquish, GCN, Thursday, April 28, 2016
The openness to new technology is a shift for a sector that has traditionally felt that “serving the common good” meant ensuring data security via private networks. Perhaps the openness to new technology can be attributed to concerns stemming from high-profile data security breaches of recent years -- JP Morgan Chase, Target and even the U.S. government -- being several examples.
Jared Serbu, Federal News Radio, Thursday, April 28, 2016
The U.S. intelligence community has just opened a new marketplace for cloud applications, the idea being to let analysts and developers test-drive thousands of commercial data analytic tools for a pittance and without waiting for their agencies to make large commitments of time and money via usual government procurement channels.
Dustin Volz, Reuters, Thursday, April 28, 2016
The Supreme Court on Thursday approved a rule change that would allow U.S. judges to issue search warrants for access to computers located in any jurisdiction, despite opposition from civil liberties groups who say it will greatly expand the FBI's hacking authority. U.S. Chief Justice John Roberts transmitted the rules to Congress, which will have until Dec. 1 to reject or modify the changes to the federal rules of criminal procedure. If Congress does not act, the rules would take effect automatically.
Mariella Moon, Engadget, Wednesday, April 27, 2016
The US House of Representatives has unanimously passed the Email Privacy Act, which updates the 1986 Electronic Communications Privacy Act (ECPA). Under ECPA, authorities are allowed to request for old emails with only a subpoena instead of a warrant. The new bill's advocates argue that ECPA is incredibly outdated at this point in time and the subpoena loophole should be closed.
Larry Elkin, Palisades Hudson, Wednesday, April 27, 2016
...the government wants to make data providers its agents in gathering intelligence and cloaking its activities. It attacks companies like Microsoft and Apple for having business motives for imposing encryption and resisting sweeping demands for data and secrecy – as though the business motive of protecting customers’ privacy is somehow suspect.