On Wednesday, President Donald Trump signed the following executive order, entitled “Securing the Information and Communications Technology and Services Supply Chain.”
Latest in Cyber & Technology
On Tuesday morning at 10:00 a.m., the Senate Judiciary Committee will hear expert testimony on the development of 5G infrastructure from the following witnesses:
After the Israel Defense Forces announced it launched an airstrike on a Hamas facility used for cyber operations, some observers warned that a dangerous line had been crossed and others questioned the legality of the strike itself. Both are wrong.
Facebook took down thousands of accounts engaged in sweeping, coordinated disinformation efforts. Why are linked accounts still active on YouTube and Twitter?
The discussion over Huawei must examine not simply whether China would use this technology maliciously, but the specific threats that Huawei equipment could pose and the extent to which these threats can be mitigated.
The Cloud Act provides that U.S. prosecutors can gain access to evidence under the possession, custody or control of a company in the U.S., regardless of where the data are stored. But European fears of economic espionage are mistaken.
What a country needs to consider before buying Huawei 5G equipment.
IT vendors are increasingly defining principles to guide the development of artificial intelligence. It’s worth taking a look at what those principles actually say.
A standard on collection should be rooted in recognized principles on collection of personal information and add some general guideposts to inform the application of the principles in the infinitely varying contexts of today’s data-driven world.