Greg Nojeim - News, Features, and Slideshows
Apple and Google should reconsider their plans to enable encryption by default on their smartphones, and the U.S. Congress should pass a law requiring that all communication tools allow police access to user data, U.S. FBI Director James Comey said.
By Grant Gross | 17 October, 2014 04:02
U.S. President Barack Obama failed to address the National Security Agency's reported efforts to weaken encryption standards and circumvent online encryption technologies in a speech Friday about surveillance reform.
By Grant Gross | 17 January, 2014 20:47
U.S. President Barack Obama's proposed changes to the National Security Agency's surveillance programs don't go far enough, some technology and digital rights groups said, while others hailed it as a good first step.
By Grant Gross | 17 January, 2014 20:00
The U.S. Department of Justice defended the National Security Agency's massive phone records collection program after a U.S. District Court judge ruled Monday that the program is likely to violate the U.S. Constitution.
By Grant Gross | 16 December, 2013 22:03
A U.S. Senate committee has voted to approve a bill that would leave in place the U.S. National Security Agency's bulk telephone-records collection program, with some limits.
By Grant Gross | 31 October, 2013 23:52
After six months of contentious debate over U.S. National Security Agency surveillance programs, prompted by leaks from former government contractor Edward Snowden, the third week in December may have marked a major turning point.
By Grant Gross | 20 December, 2013 16:11
The US presidential election result leaves President Barack Obama in the White House and maintains the balance of power in Congress. In many longstanding technology debates, policy experts see little movement forward, although lawmakers may look for compromises on a handful of issues.
By Grant Gross | 07 November, 2012 19:06
Incorporating path control in your WAN is a critical first step along the way to deploying a full SD-WAN solution. This whitepaper looks at how you can use dynamic tools to shortcut the complex configurations and expenditures of time and resources to ultimately efficiently utilise the hybrid links that may already be deployed in the network.
This infographic compares legacy backup solutions with modern data protection solutions, showing legacy backups shortcomings in pivotal areas of data protection, such as application awareness, support for cloud tiers and more. Check out this infographic to learn why modern data solutions deliver more benefits than legacy backups.
- U.S. State Department moves to block 3D-printed gun plans online
- OwnCloud's new encryption framework gives enterprises more flexibility
- Law enforcement backdoors open corporate networks to criminals
- Former attorney general calls Snowden deal possible
- Ouster of Kubuntu founder leaves its future in doubt
- Mozilla to pick up Firefox release pace, ship version 'soon' for Windows 10
- BBC unveils final version of micro:bit coding device for kids
- Researchers find previously unknown exploits among Hacking Team's leaked files
- Cisco buys cloud-based contract administrator
- The Upload: Your tech news briefing for Tuesday, July 7
- OpenSSL tells users to prepare for a high severity flaw
- Nvidia attempts to ease the path to deep learning
- FBI chief warns that terrorists hide behind encrypted communications
- Privacy group files FTC complaint to push Google to extend right to be forgotten to US
- US judge dimisses second conviction of ex-Goldman Sachs coder