The Enterprise Mobility and Security blog posted the first of a new series of informational articles that will be delving deeper into the new conditional feature.
The typical image of Chinese hackers is of operatives working for or with the tacit approval of the government, targeting valuable or sensitive data at foreign companies or government agencies. While there are plenty of those, many in China—like hackers elsewhere—also target the laptop of their ex-boss or the smartphone of the guy in front of them at the coffee shop.
Many users rely on cloud-based machine learning and data collection for everything from tagging photos of friends online to remembering shopping preferences. Although this can be useful and convenient, it can also be a user privacy disaster. With new machine learning features in its latest phone and desktop operating system releases, Apple is exploring ways to provide these kinds of services and collect related user data with more regard for privacy. Two of these features—on-device facial recognition and differential privacy—deserve a closer look from a privacy perspective.
The Federal Bureau of Investigation has been burned by insider security issues before, but is betting some crowdsourcing, a controlled environment and organizational trust can thwart threats.
Arlette Hart, chief information security officer at the FBI, outlined the agency's approach to insider security at the Structure Security conference in San Francisco. Hart's talk revolved more around process and culture rather than technology.
Salesforce is reportedly considering purchasing Twitter in a move that would give the software company access to the huge amount of data generated by the social network and could help fuel its push to develop artificial intelligence.