Page 4,280«..1020..4,2794,2804,2814,282..4,2904,300..»

Cisco Expands Cloud IoT Services with $610M Viptela Acquisition … – CIO Today

By Jef Cozza / CIO Today. Updated May 05, 2017.

This year's event, which will be held in the MGM Grand from May 15-19, will focus on issues such as security, cloud, DevOps, data and analytics, and infrastructure. The conference will include 130 sessions consisting of hands-on, panel, and speaker-led sessions.

Expanded Format

Event organizers said the decision to change Interop's format and expand its programming was due to the need to address modern trends such as artificial intelligence and security, expanding beyond its traditional focus on networking and infrastructure technology. The event will include more than two dozen sessions related to cloud technology, with cloud content being offered on each of the five days.

Several of those sessions aim to take a closer look at the role containers play in cloud-delivered services, and how they can be deployed and managed both within the cloud and on-premises. Other sessions will focus on various in-cloud services, such as the need for cloud operations to be unbound from infrastructure and tied to applications.

Security will also be a subject of major attention this year, with events focusing on strategies enterprises can use to block ransomware attacks, and how to respond to attacks once they've taken place.

Other sessions will focus on what companies can do to promote internal security, identify malicious insiders, and mitigate threats coming from within the organization without having to resort to Big Brother tactics.

Skills Shortages and IoT Threats

Skills shortages among IT professionals is another timely topic for Interop this year. A panel discussion titled "Surviving the Security Skills Shortage" will tackle questions such as how organizations can survive with small IT staffs, discover new talent, and retain talented IT security professionals once they're hired.

One of the biggest security issues for enterprises in recent years has been the advent of devices for the Internet of Things. Interop has three events scheduled on the issue. Among the IoT topics to be discussed are ways organizations can prepare to address IoT issues, adjustments they can make to identify management and risk profiles, and how to protect DNS services against security threats such as IoT botnets.

Other sessions will focus on ways enterprises can analyze the mountains of security data they have in order to extract actionable intelligence, how managers can address security issues with developers in order to get them to produce more secure code, and the basics of cyber-insurance policies.

Enterprise I.T. Exhibits

The Interop ITX exhibit hall opens Tuesday evening, May 16, followed by a full day May 17, and half day May 18.

Approximately 100 exhibitors will be on hand, including 18 designated as featured exhibitors: AT&T, IBM, Comcast Business, Kaspersky Lab, VMware, ManageEngine, Cylance, 128 Technology, Veeam, WatchGuard, Viptela, Axis Communications, ExtraHop, Cumulus, Extreme Networks, Capterra, PathSolutions, and Pluribus Networks.

Keynotes and Panels

Keynote addresses will be presented Wednesday and Thursday from 8:30 to 10:00 AM, in the MGM Grand Ballroom.

Wednesday's keynote addresses include Otto Berkes, chief technology officer for CA Technologies, speaking about "Freeing Technology to Drive Creativity."

Cyber security expert and FireEye CEO Kevin Mandia will address "Cyber Securitys Grown-Up Phase," providing tangible recommendations for what enterprises can do to survive today's increasingly complex security landscape.

A "Fireside Chat" with VMware CTO Chris Wolf will address business demands faced by VMware customers, including why IT leaders must adapt to a new type of infrastructure, plus an overview of specific technologies to help drive their businesses forward.

Wednesday "Lightning" panel presenters include analyst Sam Charrington who founded CloudPulse Strategies; Josh Bloom, who founded and serves as CTO for Wise.io; and Coco Krumme, who heads the Data Science team at Haven Inc, a technology platform for trade and logistics.

Thursday's keynotes begin with MIT Research Scientist Andrew McAfee's talk on "Harnessing the Digital Revolution." Andrew will discuss what enterprises and technology leaders need to think about with regard to machine learning and other disruptive changes expected over the next 10 years.

Also on Thursday, Susie Wee, who founded Cisco's developer program for infrastructure and application developers, will address innovative solutions using "Modern Apps on a Programmable Infrastructure."

Thursday "Lightning" panel presenters feature Amazon's Senior Manager of Talent Acquisition Ester Frey; Olga Braylovskiy who is VP of the workforce technology at Intuit; Ed McLaughlin, CIO for Mastercard; and Janine Gianfredi, Chief Marketing Officer of the United States Digital Service.

And finally, Best of Interop awards will be presented on Thursday, May 18 at 12:45pm in the Interop ITX Theater.

Read more:
Cisco Expands Cloud IoT Services with $610M Viptela Acquisition ... - CIO Today

Read More..

The Storm Platform | Liquid Web

Javascript not enabled - Portions of this site require javascript to work.

Storm Servers are the next generation of server hosting, providing the power of dedicated server hosting with the flexibility of cloud hosting. Our Storm Dedicated Servers have all the functionality of cloud servers, but are run on hardware specifically dedicated to your infrastructure. In order to make Storm Servers powerful features available to all levels of application, we also offer Storm VPS Cloud Servers, which are customizable servers of several different sizes and configurations in a shared cloud environment.

Available in Linux or Windows and featuring a full selection of Operating Systems, our Storm Platform is engineered to meet any hosting need you could imagine. Explore our additional performance options and tools ranging from solid state drives, to private cloud functionality, to both block and object storage, then let us know how we can customize the perfect hosting environment for you.

Our Storm Servers Dashboard puts you in complete control of your server and provides you immediate access to many powerful features. From here you can monitor your cloud infrastructure, reboot a server, clone a copy of your server or even add new cloud products to your account.

The mobile version of our management site gives you the peace of mind that you can have full visibility into your cloud environment no matter where you're at.

Our Storm Dedicated Servers are cloud servers on your own dedicated hardware. With the intent of making Storm Servers' powerful features available to all levels of application, we also offer Storm Cloud Servers, which are servers in a shared cloud environment. In addition to these two levels, you can add solid state storage in the form of Storm SSD -- in a number of packages -- that will help you achieve speed and performance levels that represent the future of hosting, now!

Read more here:
The Storm Platform | Liquid Web

Read More..

IT Monitoring in a Hybrid Cloud World – Virtualization Review

The Cranky Admin

Tracking what is going where now requires a completely different strategy.

One of the Web sites for which I am responsible is down. Determining why it's down is a bit of a journey. Just 10 years ago, figuring out what had gone wrong, fixing the problem and altering procedures to prevent recurrence would have been relatively easy. Today, however, hybrid IT is the new normal, and solving these sorts of problems can be quite complex.

Ten years ago I had all my clients hosting their Web sites on their own servers. On behalf of my clients, we ran email servers, DNS servers, caching, load balancing, intrusion detection, front-end, database, a box full of crazed squirrels, you name it. None of the datacenters I oversee are large, but at their peak, several of them ran a few thousand workloads.

This was in the days before desired state configuration and the "pets vs. cattle" debate. There were a lot of pets in these datacenters.

As you can imagine, workloads were sent into the public cloud. Web-facing stuff first, because it had a lot of infrastructure "baggage." Ever more mission-critical workloads moved until -- seemingly without anyone noticing -- the on-premises datacenter, the hosted solutions at our local service provider, and the public cloud workloads were scattered about the continent.

Despite the geographic dispersal of workloads amongst various providers, however, any given client's workloads remained critically conjoined. What was out in the public cloud fed into the on-premises systems, and everything had to be synchronized to the hosted systems for backups. If the wrong bit fell over, everything could go sideways.

This could be useful additional diagnostic information for me, or a separate fire to put out. I won't know until I'm a little further down the rabbit hole, but it is troubling.

Having spent years with pre-virtualized one-application-per-metal-box workloads, whenever something stops working my first instinct is to look for hardware failure. Today, that would mean seeing if the virtual servers, hosting provider or public cloud had fallen over.

A quick look see shows that I can connect to all the relevant management portals; the various management portals claim all the workloads are up and running. Unfortunately, I can't seem to log in to any of these workloads using SSH. This is alarming.

The hosting provider gives me console access to workloads -- something that, sadly, my public cloud provider does not -- and I am able to quickly assess that the various Web site-related workloads are up and running, have Internet access, and otherwise seem healthy, happy and enjoying life. They are not currently handing customers, which means that the switchover mechanism believes the primary workloads are still active.

I get an email on my phone, so something has to be working with the public cloud hosted workloads; part of the mobile email service chain lives there. I hop on Slack and ask a few of my sysadmin buddies to test my Web site. Some of them can get there, some of them can't.

While I pour coffee into my face and curse the very concept of 6 a.m., a phone call comes in from a panicked sales manager: only orders from one specific Web site have showed up in the points of sale system overnight. Five other Web sites haven't logged a single order.

Rather than drag you through each troubleshooting stage, I'll jump right to the end: the answer was DNS. More specifically, the outsourced DNS provider had a really interesting oopsie where half of their resolvers wouldn't resolve half of our domain names and the other half worked perfectly. This broke nearly everything, and we weren't prepared for it.

In the case of my early morning outage, because there was not actually anything wrong with the Web site, and the hosting provider provides a caching DNS server, the monitoring solution didn't see anything wrong. It could resolve domain names, get to the relevant Web sites, see email passing and so forth.

Back in the day when everything ran from a single site, this was fine. Either things worked, or they didn't. If they didn't work, wait a given number of minutes, then flip over to the disaster recovery site. Life was simple.

Today, however, there are so many links in the chain that we have to change how we monitor them. DNS, for example, clearly needs to be monitored from multiple points around the world so that we can ensure that resolution doesn't become split-brained. Currently none of our customers use geo-DNS-based content delivery for network-based regional Web site delivery, but it's been discussed. That would add yet another layer of monitoring complexity, but this sort of design work can't be ignored.

There is middleware that collects order tracking information from manufacturing, invoicing from points of sale, information from the e-stores and logistics information from the couriers. All of this is wrapped up and sent to customers in various forms: there are emails, desktop and mobile Web sites and SMS pushes. I think one client even has a mobile app. The middleware also tracks some advertising data from ad networks and generates reports.

Somewhere in there is email. Inbound email goes through some hosted anti-spam and security solutions. Outbound email comes from dozens of different pieces of software that will forward through smart hosts at various points until they are funneled through the main server located in the cloud. Email can originate from end users or from office printers, manufacturing equipment, the SIP phone system or any of dozens of other bits of machinery.

None of the clients I act as sysadmin for are currently more than 200 users. Most are in the 50-user range. None of the technology they have deployed is even as complicated as a hybrid Exchange setup or hybrid Active Directory.

Despite this, these small businesses are thoroughly enmeshed in hybrid IT. This multi-site, multi-provider technological interconnectivity means changing how we think about monitoring.

Hybrid IT is not a novelty. It's not tomorrow's technology. It's the everyday business of everyday companies, right now, today. Are you ready?

About the Author

Trevor Pott is a full-time nerd from Edmonton, Alberta, Canada. He splits his time between systems administration, technology writing, and consulting. As a consultant he helps Silicon Valley startups better understand systems administrators and how to sell to them.

Go here to see the original:
IT Monitoring in a Hybrid Cloud World - Virtualization Review

Read More..

Verizon Sells Cloud, Managed Hosting Service to IBM – Talkin’ Cloud

Brought to you by The WHIR

Verizon has reached a deal to sell its cloud and managed hosting service to IBM, the company announced Tuesday in a blog post. The terms of the deal were not disclosed.

The move comes as Verizon has finalized its deal with Equinix where it sold29 data centers to Verizon for $3.6 billion.

In a blog post this week,George Fischer, SVP and Group President of Verizon Enterprise Solutions said that it will notify affected customers directly, but it does"not expect any immediate impact to their services as a result of this agreement."

"We will formally notify and update customers as appropriate with additional information nearer the close of the deal. We expect the transaction to close later this year," he said.

This agreement presents a great opportunity for Verizon Enterprise Solutions (VES) and our customers, Fischersaid in the post. It is the latest development in an ongoing IT strategy aimed at allowing us to focus on helping our customers securely and reliably connect to their cloud resources and utilize cloud-enabled applications. Our goal is to become one of the worlds leading managed services providers enabled by an ecosystem of best-in-class technology solutions from Verizon and a network of other leading providers.

The companies will also work together on a number of strategic initiatives related to cloud and networking.

The deal was reached last week, according to Fischer. VES will continue offering intelligent networking, managed IT services and business communications, and also investing in technology to help customers improve application performance, streamline operations, and secure data in the cloud.

IBM recently launched four new cloud data centers in the U.S., bringing its national total to 22.

Read more from the original source:
Verizon Sells Cloud, Managed Hosting Service to IBM - Talkin' Cloud

Read More..

Are we heading for a new encryption war? – ZDNet

Government agencies want their own backdoor into communications.

More details of how the UK's new surveillance law will operate have been revealed, in details about the use of encryption.

Under draft regulations to support the new Investigatory Powers Act, the government will be able to issue 'technical capability notices' to companies with more than 10,000 UK users to make it easier for police, spy agencies and other government bodies to access their customers' communications.

In particular, the regulations require companies to provide and maintain "the capability to disclose, where practicable, the content of communications or secondary data in an intelligible form and to remove electronic protection applied by or on behalf of the telecommunications operator to the communications or data, or to permit the person to whom the warrant is addressed to remove such electronic protection."

Those powers means it will be extremely difficult for tech companies and ISPs in the UK to offer their own end-to-end encryption services to their customers. That's because end-to-end encryption only allows the sender and the recipient of the communications to read the message: it is hidden from the company that sends it, as well as from other prying eyes.

The leaked paper was revealed by the Open Rights Group, and the group's executive director Jim Killock said the powers could be used to force companies to limit encryption, and that when these powers are used, it would be done in secret.

"There needs to be transparency about how such measures are judged to be reasonable, the risks that are imposed on users and companies, and how companies can challenge government demands that are unreasonable", he said.

"Businesses and the public need to know they aren't being put at risk. Sometimes, surveillance capabilities may be justified and safe: but at other times, they might put many more people - who are not suspected of any crime - at risk."

Police and intelligence agencies have long worried about losing the ability to intercept the communications of criminals and terrorists, who are able to plot in secret using encrypted messaging apps. It's a legitimate concern, but not one that is likely to be addressed by this legislation.

Criminals are simply going to switch to services based in other countries, or find even more obscure ways to communicate. And it may also make us less secure. The events of the last year have shown that criminals and state-sponsored hackers are always looking for ways to access and steal communications. Forcing the UK to use weaker forms of secure messaging will make the job of foreign spies and crooks much easier.

And those ISPs and tech companies that are obliged to hold our unencrypted messages? Effectively they will have a big red target painted on them forever more. If hackers and intelligence agencies know that these companies have the means to decode any messages on their network, then cracking their security becomes a priority.

Still, it's also important to consider the international perspective here: most secure messaging apps are not based in the UK, but in the US and the rest of the world, where the UK's law will have little impact. For these companies the UK is just one market among many, and they won't change their tech strategy just for one goverment, especially if their own goverment imposes no such demands.

So it's highly unlikely that the messaging apps we use, in our millions, every day, will be stripped of their end-to-end encryption anytime soon. UK phone companies and ISPs offering such services will simply shrug, and point out they did not add the encryption in the first place and therefore have no way of removing it. That's a big hole in the legislation.

However, there is another international dimension to consider. It could be that some countries will take the UK's law as a blueprint for their own surveillance laws (and the row over encryption is just one element of the legislation which also includes a legal framework for police and intelligence agencies to hack smartphones, PCs, tablets or computer infrastructure and requires ISPs to retain details of the internet browsing history of the entire country for 12 months.)

If enough countries decide they want similar legislation in place (the UK laws go further than similar laws in other democratic countries) and do not want companies in their jurisdiction offering end-to-end encryption then it may become harder for many people to use encryption as they do today.

That may make it easier to police and intelligence agencies to track criminals but at a cost to the security of the majority (and it would still be all but impossible to stop the use of end-to-end encryption completely).

But already, the idea of some kind of encryption legislation seems to be gaining traction in the US again; could we be heading back towards the sort of 'crypto wars' fought in the 1990s?

The UK's lone stand against encryption is unlikely to succeed, but it may point to bigger battles ahead.

See original here:
Are we heading for a new encryption war? - ZDNet

Read More..

Encryption keeping FBI from accessing thousands of lawfully seized smartphones: Comey – Washington Times

Nearly half of all smartphones and other digital devices lawfully seized by the FBI are useless to federal investigators because theyre protected with encryption, FBI Director James B. Comey told the Senate Judiciary Committee on Wednesday.

Of more than 6,000 devices obtained by the FBI between Oct. 1 and March 31, Mr. Comey said 46 percent were safeguarded by strong encryption that renders them unreadable to authorities.

That means half of the devices that we encounter in terrorism cases, in counterintelligence cases, in gang cases, in child pornography cases, cannot be opened with any technique, Mr. Comey told the Senate panel.

That is a big problem, he added. And so the shadow continues to fall.

Lawmakers have weighed options to alleviate the FBIs so-called going dark problem for years. Myriad security and privacy concerns hindered attempts to legislate encryption during former President Obamas tenure in office, however, all the while Apple and Google enabled the widespread rollout of digital encryption by enabling the feature by default on their bestselling smartphones.

The Obama administration was not in a position where they were seeking legislation, Mr. Comey told lawmakers Wednesday. I dont know yet how President Trump intends to approach this. I know he spoke about it during the campaign, I know he cares about it, but its premature for me to say.

Indeed, Mr. Trump encouraged a boycott against Apple last year when federal investigators found themselves unable to obtain data from an encrypted iPhone recovered from the scene of a terror attack in San Bernardino, California. The FBI ultimately accessed the evidence with the help of outside security researchers, albeit at a cost of $900,000, Senator Dianne Feinstein, California Democrat, said at Wednesdays hearing.

Ms. Feinstein asked the FBI director if the government should legislate encryption Wednesday, to which he responded: we arent there now.

Weve had very good, open and productive conversations with the private sector over the last 18 months about this issue, because everybody realized we care about the same things, Mr. Comey said Wednesday. We all love privacy. We all care about public safety.

What we want to work with manufacturers on is to figure out how can we accommodate both interests in a sensible way? How can we optimize the privacy, security features of their devices and allow court orders to be complied with? Were having some good conversations. I dont know where theyre going to end up, frankly. I could imagine a world that ends up with legislation saying, if youre going to make devices in the United States, you figure out how to comply with court orders, or maybe we dont go there. But we are having productive conversations, right now I think, Mr. Comey said.

Read the original:
Encryption keeping FBI from accessing thousands of lawfully seized smartphones: Comey - Washington Times

Read More..

Encryption is Back in the Saddle Again – Niskanen Center (press release) (blog)

May 4, 2017 by Ryan Hagemann

A little over three months into 2017 and encryption is once again coming into focus.

Yesterday, in testimony before the Senate Judiciary Committee, FBI director James Comey was asked about the ongoing Going Dark problem. He noted that thus far, in just the first three months of this year, almost half of all pending cases at the FBI involved devices or systems that cannot be opened with any technique available to the federal law enforcement agency. He went on to note a collision between privacy and security, but stopped short of supporting a legislative mandate, arguing that while the encryption issue may require a legislative solution, it was premature for him to say anything definite. Sen. Dianne Feinstein (D-CA), however, was certain of her position, and noted her intention to reintroduce last years Compliance with Court Orders Act, co-sponsored with Sen. Richard Burr (R-CA) (around the 3:06:00 mark). For a more detailed analysis on the ins-and-outs of that bills many flaws, see here, here, and here.

The Burr-Feinstein legislation will undoubtedly set the tone for one extreme of the forthcoming encryption debate. Id wager that on the other end of the spectrum well hear a lot of the same talking points we heard during the height of the Apple vs FBI fight from this time last year. The same folks armed with the same messages are going to be entrenching themselves on the same battle-wearied policy hills, lobbing the same talking points at one another. Once more, the perfect is set to be the enemy of the good.

Maybe this time, however, we can aim to lift the voices of the moderate middle on this issuethose stakeholders that have all-too-unfortunately been drowned out by the more sensationalized messages from the polar extremes that often dominate the headlines. Instead of business-as-usual in the encryption debate, moderates on both sides of the debate need to signal support for the only other legislative proposal that has the political viability and compromise-oriented policy prescription necessary to defuse the Burr-Feinstein bill: the McCaul-Warner Digital Security Commission.

Ive written about the Commission a lot over the past year and a half, but it remains as clear today as it did then that this approach is the only viable path forward towards achieving compromise on the encryption debate. Talks between the FBI and the technology industry, according to Comey, have been good, but he remains uncertain as to whereif anywhere those conversations will lead. Those types of behind-the-scene stalemates are likely the reason a lot of tech companies, including Facebook and Apple, have signaled support for McCaul-Warner. If Burr-Feinstein is poised to move, its more imperative than ever that both encryption supporters and centrist politicians start putting their weight behind the only bill that respects the complexity of the issues involved in this debate.

The ebb and flow of policy priorities can sometimes feel cyclical, but few issues are as perennial as encryption (though net neutrality may give it a run for its money). As we prepare for yet another ride on this perpetual motion policy merry-go-round, its worth remembering that in between the polar extremes lies a significant moderate majority. In the event a political opportunity or necessity arises, the McCaul-Warner Commission is likely going to appeal more to those policymakers than either the do nothing approach or Burr-Feinstein. Despite all the loud voices in the encryption debate, it may be that silent moderate majority that ends up as the real heroes in this debate.

Go here to see the original:
Encryption is Back in the Saddle Again - Niskanen Center (press release) (blog)

Read More..

FBI Director: Criminal Use Of Encryption Is Skyrocketing – Vocativ

The FBI says almost half of its investigations are now impeded by suspects using phones or computers with encryption.

Its the latest escalation in a tough issue with no clear resolution:how should the FBI should deal with privacy-protecting consumer encryption a technology thats almost impossible to regulate or prohibit when criminals can also use it to impede investigations?

The shadow created by the problem we call going dark continues to fall across more and more of our work, FBI Director James Comey told the Senate Judiciary Committee in testimony Wednesday.

In the first six months of the current fiscal year meaning from October 1, 2016 and April 1, 2017 the FBIwascompletely unable to open a device 46% of the time, Comey said.

Thats an apparent jump from previous FBI figures. In November, the FBI told Vocativ that over the previous 10 month period, it had tried to unlock 6,814 phones, both for its own and local and state police investigations. Of the 2,095 that actually had passcodes enabled, it was unable to get into 885 different phones, or about42%.

The FBI didnt respond to request for more thorough updated figures.

The agency has famously struggled with smartphone security in the past. Notably, after an ISIS-inspired couple murdered 14 people in San Bernardino, California, in 2015, the FBI tried to legally compel Apple to create a fake update for an iPhone to break in and gather its contents as evidence. Apple staunchly resisted CEO Tim Cook said the request was the software equivalent of cancer and would set a devastating legal precedent before the FBI found a third-party company that it could hire to hack that particular phone.

And encryption has boomed in popularity in recent months. Both iPhones and Android devices are encrypted if their owner creates a passcode or fingerprint to open it. A number of popular messaging apps, including WhatsApp and iMessage, adopted strong end-to-end encryption in 2016, meaning those devices manufacturers dont possess a means to unlock the users message. And Signal, widely regarded by cybersecurity experts as the best user-friendly encrypted messaging service, has seen its downloads soar.

Its unclear what, if anything, Comey wants to change, however. Previous draft bills in Congress that would aim to outlaw encryption have been resoundingly mocked by technologists and never went before a vote, and many experts say such a bill would be an attempt to ban math.

Cryptography experts resoundingly agree that asking companies like Apple to build backdoors into an encrypted program a secret hack for law enforcement to be able to circumvent it would invariably open the door for hackers and malicious government actors. Comey did stress, however, that he wasnt pushing for backdoors.

We all love privacy, he said in the hearing, responding to Senator Orin Hatch (R-Utah). We all care about public safety. And none of at least people that I hang around with, none of us want backdoors. We dont want access to devices built-in in some way.

He did, however, admit it was difficult to come to such a solution. I dont know where theyre going to end up, frankly, he said.

Excerpt from:
FBI Director: Criminal Use Of Encryption Is Skyrocketing - Vocativ

Read More..

Jakarta Declaration Calls on Governments to Recognize Legitimacy of Encryption – CircleID

Today in Indonesia, media leaders gathered at UNESCO's World Press Freedom Day event issued the "Jakarta Declaration" calling on governments of the world to recognize the importance of a free and independent media in creating "peaceful, just and inclusive societies". The declaration calls on governments to take steps to support the freedom of the press, and, in the midst of the many actions was this statement:

34. Recognise the legitimacy of the use of encryption and anonymisation technologies;

As a long-time advocate for the widespread usage of encryption to protect our personal communication, I was extremely pleased to see this statement included in the declaration.

My colleague Constance Bommelaer wrote in detail yesterday about WHY encryption is so critical for journalists:

The future of the free press is at risk: encryption is part of the solution

She ends the piece with this call to action:

Governments have a role too. We invite them to adopt the SecureTheInternet principles and to support strong encryption, not only to ensure the safety of journalists, but also as a technology that already allows us to do our banking, conduct local and global business, run our power grids, operate communications networks, and do almost everything else.

As we celebrate World Press Freedom Day, we must remember that journalists and their sources are taking enormous risks right now in making sure crucial stories get told.

In today's environment, where trust in online information is at an all-time low, we need free, safe and independent journalists more than ever. We all have a role to play, and encryption is one step to take us there.

We all DO have a role. And encryption is part of how we get there.

I encourage you all to share this news about the Jakarta Declaration; to share the Jakarta Declaration document itself; to learn more about encryption; and to help people understand why encryption is critical for securing our digital economy!

By Dan York, Author and Speaker on Internet technologies - and on staff of Internet Society. Dan is employed as a Senior Content Strategist with the Internet Society but opinions posted on CircleID are entirely his own. Visit the blog maintained by Dan York here.

Related topics: Policy & Regulation, Privacy, Security

Read more:
Jakarta Declaration Calls on Governments to Recognize Legitimacy of Encryption - CircleID

Read More..