Encryption & Key Management , Governance & Risk Management , ISMG Security Report
Evaluating Impact of Lawful Hacking, Metadata
Also, Examining Trump's Pending Cybersecurity Executive OrderIn this edition of the ISMG Security Report: An evaluation of the challenges law enforcement faces in using lawful hacking and metadata as an alternative way to collect evidence when cracking an encrypted device is not an option.
Also in this report (click on player beneath image to listen), you'll hear an analysis of the Trump administration's revised cybersecurity executive order that could be issued soon.
The ISMG Security Report appears on this and other ISMG websites on Tuesdays and Fridays. Please check out our Feb 3 and Feb. 7 reports, which respectively analyze passage of a bill aimed at toughening insider threat defenses at the U.S. Department of Homeland Security and a major fine against a Texas hospital and its implications for how the Trump administration might enforce HIPAA regulations.
The next ISMG Security Report will be posted on Tuesday, Feb. 14.
Theme music for the ISMG Security Report is by Ithaca Audio under the Creative Commons license.