Access "Bruce Schneier and Marcus Ranum Face-Off: Should We Have an Expectation of Online Privacy?"
This article is part of the May 2009 issue of How automated compliance solutions can help you plan for your next audit
Point: Marcus Ranum In a recent court decision, a Canadian judge ruled that Internet users have no reasonable expectation of privacy with regard to warrantless collection of subscriber/IP address information from a suspected child pornographer's ISP. Couple that with the Bush administration's cheerful bypassing of warrants for wiretaps against U.S. citizens, and those are just two of the more public instances we've heard of where privacy has been trampled. (There's no need to mention the many governments that don't hesitate for a second to collect whatever information they can regarding their citizens' activities.) Does this mean that the notion of online privacy is in jeopardy? From the beginning, online privacy was probably more of a goal than a reality -- a goal that was near and dear to a few technologically sophisticated users: the Cypherpunks, and the Electronic Frontier Foundation. Everyone else either assumed their actions were private, or didn't really care. Indeed, most people's lives really aren't worth looking at, unless you're somehow involved ... Access >>>
Premium Content for Free.
Changing times for identity management
Identity management technology is adapting to meet enterprise needs. Learn what products can improve security and ease compliance.
Know when you need IDS, IPS or both
Cut through the hype and learn the differences and benefits of intrusion detection and prevention systems.
- Changing times for identity management
Cybersecurity Act of 2009: Power grab, or necessary step?
The Cybersecurity Act of 2009, also known as S.773, would give the president unprecedented authority over federal and private networks. Experts debate whether it's a power grab, or a signal of the seriousness of threats to critical infrastructure.
Ease the compliance burden with automation
Manual compliance processes are error-prone and drain corporate IT resources. Automated tools make a difference if you apply them to a well-organized compliance program.
- Cybersecurity Act of 2009: Power grab, or necessary step?
Service-focused security offers best value to organization
A service-oriented approach is the best way to demonstrate security's value and win support for security initiatives.
The Pipe Dream of No More Free Bugs
Security researchers have declared they want vendors to compensate them for their independent search for vulnerabilities.
Bruce Schneier and Marcus Ranum Face-Off: Should We Have an Expectation of Online Privacy?
by Marcus J. Ranum, Contributor
Security experts Bruce Schneier and Marcus Ranum debate whether users should have an expectation of online privacy.
- Service-focused security offers best value to organization
More Premium Content Accessible For Free
Despite the enormous concerns around cloud security, many information security professionals remain on the sidelines when it comes to their ...
Not only is modern malware getting more prevalent and sophisticated, it's also now focusing on a broader array of targets. Attackers would still love...
IT Decision Center
Learn how to evaluate your potential vendor's UTM product and its ability to meet your specific business requirements.