Skip to content ↓ | Skip to navigation ↓

Following the infamous celebrity iCloud “hack” and the introduction of Apple Pay and Healthkit, Apple has vowed to strengthen their security protocols. The company reactivated two-factor authentication, which was tested but disabled in June, and published a new privacy policy detailing how they protect user info and respond to government requests.

Apple’s approach to boosting security is completely different that other major Internet vendors. Google recently announced its support for Simply Secure, a new industry initiative that will work with open-source groups to make security more simple to implement.

Why, exactly, have Apple and Google approached security such different perspectives?

Listen to our latest security slice podcast and hear Tim ErlinTyler Reguly and Craig Young discuss which security fixes iOS 8 ignored, the possible “ulterior” motives behind Apple and Google’s security programs and why two-factor authentication would not have stopped the iCloud hacks.






picThe Executive’s Guide to the Top 20 Critical Security Controls

Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].

Title image courtesy of ShutterStock