The Latest in IT Security

1

Under the new rules passed by China’s top legislative body, state and private entities handling personal information will be required to reduce data collection and obtain user consent. The Chinese state security apparatus will maintain access to swathes of personal data, however. Beijing has long been accused of harnessing big tech to accelerate repression in […]

Read more ...

1

An experimental setting has appeared in the experimental Android version of Chrome that will give users of Google’s browser the ability to block access to Incognito tabs. Access will only be granted when the correct lock screen password is entered, or the relevant biometrics are provided. This means that until your phone camera successfully scans […]

Read more ...

1

A firestorm emerged on Friday and raged during the weekend over Apple’s new “Expanded Protections for Children,” a series of measures across Apple’s platforms aimed at cracking down on child sexual abuse material (CSAM). The new protections address three areas, including communications tools for parents and updates to Siri and search to help children and […]

Read more ...


Categories

TUESDAY, APRIL 22, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments