Mayorkas, a former U.S. attorney and former deputy secretary of Homeland Security, is a known commodity in cybersecurity quarters, having worked on several key components of cyber policy, including threat information sharing, during his run in the Obama administration.
DNS over HTTPS prevents third parties from eavesdropping on addresses of the websites a person visits. It is a leap forward for privacy, but it faced criticism from various groups that depend on access to those URLs.
Though most agree that career employees at CISA will continue what Krebs started, lack of leadership creates an uncertain limbo for private sector partners.
CISA’s successes are often attributed to a deliberate effort by Chris Krebs to reshape the agency into one that epitomizes the best of public-private partnerships.
What Akropolis is doing strikes experts in bounty and disclosure programs as crossing a line – using the good works of bug bounties to paper over what is, in effect, a ransom.
Researchers at the mobile tech giant are calling upon peers to help define the attackers end game.
Some on social media speculated the resolution would be binding or that legislation was imminent. Neither are true. But it’s another signal that encryption isn’t settled policy in even the privacy-protective EU.
As it currently stands, Zoom agrees not to mislead the public about security features and regularly audit its security in a variety of ways. It also agrees to follow standardized processes for video file naming, personal data deletion, and investigating security events.
As the cybersecurity community assesses a potential Biden White House, privacy regulations, global internet surveillance practices, and supply chain security are all at play.