Friday, November 15, 2013

Snowden's Impact on the Enterprise: How Mobile Security is Evolving Post-NSA Leak |

The country is abuzz with the controversy stirred-up by the public release of the first hints of four laptops worth of top-secret, government documents by former NSA contractor, Edward Snowden. In a recent email exchange with New Hampshire Senator, Gordon Humphrey, Snowden assures the Senator that our national secrets are safe with him. He writes that “no intelligence service — not even our own — has the capacity to compromise the secrets I continue to protect.” While public opinion has shifted slightly in Snowden’s favor (55% whistle-blower to 34% traitor respectively according to Quinnipiac University poll released July 10), only time will tell what else is on those laptops, what information will be released, and how severe the damage will be. There is already deep introspection concerning current practices for document collaboration between contractors and government agencies; practices that resulted in the unintentional exposure of the secrets of the country to the scrutiny of the world.
Snowden's Impact on the Enterprise: How Mobile Security is Evolving Post-NSA Leak | Innovation Insights | Wired.com