Skip to content ↓ | Skip to navigation ↓

Following the infamous celebrity iCloud “hack” and the introduction of Apple Pay and Healthkit, Apple has vowed to strengthen their security protocols. The company reactivated two-factor authentication, which was tested but disabled in June, and published a new privacy policy detailing how they protect user info and respond to government requests.

Apple’s approach to boosting security is completely different that other major Internet vendors. Google recently announced its support for Simply Secure, a new industry initiative that will work with open-source groups to make security more simple to implement.

Why, exactly, have Apple and Google approached security such different perspectives?

Listen to our latest security slice podcast and hear Tim ErlinTyler Reguly and Craig Young discuss which security fixes iOS 8 ignored, the possible “ulterior” motives behind Apple and Google’s security programs and why two-factor authentication would not have stopped the iCloud hacks.

 

 CLICK HERE TO LISTEN TO THE PODCAST

 

MORE PODCASTS

RESOURCES:

picThe Executive’s Guide to the Top 20 Critical Security Controls

Tripwire has compiled an e-book, titled The Executive’s Guide to the Top 20 Critical Security Controls: Key Takeaways and Improvement Opportunities, which is available for download [registration form required].

Title image courtesy of ShutterStock

SANS White Paper: Security Basics
  • Jessica Dodson

    When you think about it, we are putting (we the consumers) a ton of faith in our tech providers. Think about all the information we store on our phones: photos, credit cards, bank accounts, addresses, passwords and more. One hack can put all our personal data out there for the world to see.

<!-- -->