British PM Wants To Ban Encryption

UK-Ban.png

 

David Cameron has signalled that he intends to ban strong encryption, putting the British government on a collision course with some of the biggest tech companies in the world. The British Prime Minister re-affirmed his commitment to tackling strong encryption products in Parliament in response to a question.

Strong encryption refers to the act of scrambling information in such a way that it cannot be understood by anyone — even law enforcement with a valid warrant, or the software company itself — without the correct key or password.

It's currently used in some of the most popular tech products in the world, including the iPhone, WhatsApp, and Facebook.

But amid heightened terrorism fears, David Cameron is attempting to take action.

Over the last year, encryption has become a hot tech policy issue. Following exiled whistleblower Edward Snowden’s revelations about mass surveillance online by the NSA and other spy agencies, tech companies have increasingly moved to incorporate strong encryption into their products to protect consumers’ data. And simultaneously, governments and law enforcement officials have upped their rhetoric, warning that proliferation of the tech could help terrorists and criminals evade capture.

When Apple implemented strong encryption by default in late 2014, for example, a senior US police officer warned that the iPhone would become the “phone of choice for the pedophile” as a result. And European police chief Rob Wainwright said in March 2015 that encryption is now the “biggest problem” in tackling terrorism.

It’s a difficult situation. On the one hand, it’s easy to sympathise with law enforcement, who fear that large amounts of communications data they previously had access to are now “going dark.” 
But security experts warn that any attempt to weaken encryption or introduce “back doors” for the authorities can have unintended and dangerous consequences. There’s no back door that can only be used by the good guys, they argue, and weakening the tech will put consumers at risk from criminals and hackers.

Yahoo : http://bit.ly/1Lb41cV

« Use Threat Intelligence to Boost Mobile Security
FBI - Encryption is Great as Long as it Still Lets Us In »

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ITQ

ITQ

ITQ is an IT consulting firm with a focus on the entire VMware-product portfolio with three main services: Professional Services, Support Services and Managed Services.

SCADAhacker

SCADAhacker

SCADAhacker provides mission critical information relating to industrial security of SCADA, DCS and other Industrial Control Systems.

CRU Data Security Group (CDSG)

CRU Data Security Group (CDSG)

CRU is a pioneer in devices for data mobility, data security, encryption, and digital investigation.

Anitian

Anitian

The Anitian Compliance Automation platform builds, configures, and monitors cloud environments to accelerate compliance for standards such as FedRAMP, PCI, ISO/GDPR and CJIS.

Korn Ferry

Korn Ferry

Korn Ferry is a global organizational consulting firm, synchronizing strategy and talent to drive superior performance for our clients in key areas including cybersecurity.

Pivot Point Security

Pivot Point Security

Pivot Point Security is a trusted leader in information security consulting. We help clients master their information security management systems.

ThreatX

ThreatX

ThreatX provides complete web application & API protection to address expanding app footprints and complex attacks.

Next Peak

Next Peak

Next Peak provides cyber advisory and operational services based on deep business and national security experience, thought leadership, and a network of front-line defenders.

Axitea

Axitea

Axitea designs, implements and develops the solutions best suited to its customers’ needs and their physical and cyber security requirements.

Lockheed Martin

Lockheed Martin

Lockheed Martin deliver full-spectrum cyber capabilities and cyber resilient systems to defense, intelligence community and global security customers.

Zaviant Consulting

Zaviant Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations.

WiebeTech

WiebeTech

WiebeTech’s line of digital forensics tools provide innovative and rugged devices for efficient disk imaging and evidence capture.

EDGE Group

EDGE Group

EDGE is one of the world’s leading advanced technology groups, established to develop agile, bold and disruptive solutions for defence and beyond.

SNC-Lavalin

SNC-Lavalin

SNC-Lavalin is a fully integrated professional services and project management company with offices around the world.

Oxylabs

Oxylabs

Oxylabs is the largest datacenter proxy pool in the market, with over 2 million proxies. Designed for high-traffic, fast web data gathering while ensuring superior performance.

QualySec

QualySec

QualySec is a leading cybersecurity firm specializing in comprehensive penetration testing and risk assessment services.