News Gist .News

Articles | Politics | Finance | Stocks | Crypto | AI | Technology | Science | Gaming | PC Hardware | Laptops | Smartphones | Archive

Under the Hood of Data Sovereignty

Organizations are increasingly grappling with the complexities of data sovereignty as they transition to cloud computing, facing challenges related to compliance with varying international laws and the need for robust cybersecurity measures. Key issues include the classification of sensitive data and the necessity for effective encryption and key management strategies to maintain control over data access. As technological advancements like quantum computing and next-generation mobile connectivity emerge, businesses must adapt their data sovereignty practices to mitigate risks while ensuring compliance and security.

See Also

Microsoft Updates Terms on Data Privacy Amid EU Probe Δ1.77

Microsoft is updating its commercial cloud contracts to improve data protection for European Union institutions, following an investigation by the EU's data watchdog that found previous deals failed to meet EU law. The changes aim to increase Microsoft's data protection responsibilities and provide greater transparency for customers. By implementing these new provisions, Microsoft seeks to enhance trust with public sector and enterprise customers in the region.

Planning Ahead Around Data Migrations Δ1.75

Effective data migration planning is crucial for businesses as the volume of data generated continues to rise, necessitating careful management to avoid operational disruptions. Understanding the system components and dependencies is essential for a smooth migration, while clear communication with stakeholders about potential impacts can mitigate risks associated with technology changes. A methodical, step-by-step approach, including practices like canary deployments and automated performance tracking, can help ensure that migrations are executed successfully and with minimal downtime.

US Lawmakers Press Chinese Telecoms Over Ties to Military, Government Δ1.75

US lawmakers have raised national security concerns in letters to top Chinese telecom companies, China Mobile, China Telecom, and China Unicom, citing the potential for these firms to exploit access to American data through their U.S. cloud and internet businesses. The lawmakers are seeking details on any links between the companies and the Chinese military and government by March 31, amid concerns about unauthorized data access, espionage, or sabotage. National security experts have warned that China Telecom's operations in the US could pose a significant risk to American telecommunications networks.

Apple Refuses to Break Encryption, Seeks Reversal of UK Demand for Backdoor Δ1.74

Apple's appeal to the Investigatory Powers Tribunal may set a significant precedent regarding the limits of government overreach into technology companies' operations. The company argues that the UK government's power to issue Technical Capability Notices would compromise user data security and undermine global cooperation against cyber threats. Apple's move is likely to be closely watched by other tech firms facing similar demands for backdoors.

The Surveillance Tech Waiting for Workers as They Return to the Office Δ1.74

Warehouse-style employee-tracking technologies are being implemented in office settings, creating a concerning shift in workplace surveillance. As companies like JP Morgan Chase and Amazon mandate a return to in-person work, the integration of sophisticated monitoring systems raises ethical questions about employee privacy and autonomy. This trend, spurred by economic pressures and the rise of AI, indicates a worrying trajectory where productivity metrics could overshadow the human aspects of work.

Unlocking AI’s True Potential: The Power of a Robust Data Foundation. Δ1.74

Businesses are increasingly recognizing the importance of a solid data foundation as they seek to leverage artificial intelligence (AI) for competitive advantage. A well-structured data strategy allows organizations to effectively analyze and utilize their data, transforming it from a mere asset into a critical driver of decision-making and innovation. As companies navigate economic challenges, those with robust data practices will be better positioned to adapt and thrive in an AI-driven landscape.

Ransomware Dominates Cybersecurity Threats in 2024 Δ1.73

The modern-day cyber threat landscape has become increasingly crowded, with Advanced Persistent Threats (APTs) becoming a major concern for cybersecurity teams worldwide. Group-IB's recent research points to 2024 as a 'year of cybercriminal escalation', with a 10% rise in ransomware compared to the previous year, and a 22% rise in phishing attacks. The "Game-changing" role of AI is being used by both security teams and cybercriminals, but its maturity level is still not there yet.

Microsoft Warns of Chinese Hackers Targeting Cloud Apps to Steal Business Data Δ1.73

Microsoft's Threat Intelligence has identified a new tactic from Chinese threat actor Silk Typhoon towards targeting "common IT solutions" such as cloud applications and remote management tools in order to gain access to victim systems. The group has been observed attacking a wide range of sectors, including IT services and infrastructure, healthcare, legal services, defense, government agencies, and many more. By exploiting zero-day vulnerabilities in edge devices, Silk Typhoon has established itself as one of the Chinese threat actors with the "largest targeting footprints".

The Regulation of Digital Sequence Information Goes Global Δ1.73

Digital sequence information alters how researchers look at the world’s genetic resources. The increasing use of digital databases has revolutionized the way scientists access and analyze genetic data, but it also raises fundamental questions about ownership and regulation. As the global community seeks to harness the benefits of genetic research, policymakers are struggling to create a framework that balances competing interests and ensures fair access to this valuable resource.

Uk Will neither Confirm nor Deny that It’s Killing Encryption Δ1.73

The UK government's reported demand for Apple to create a "backdoor" into iCloud data to access encrypted information has sent shockwaves through the tech industry, highlighting the growing tension between national security concerns and individual data protections. The British government's ability to force major companies like Apple to install backdoors in their services raises questions about the limits of government overreach and the erosion of online privacy. As other governments take notice, the future of end-to-end encryption and personal data security hangs precariously in the balance.

TikTok’s American Ownership Rule Ignores Bigger IoT Threat Δ1.73

The debate over banning TikTok highlights a broader issue regarding the security of Chinese-manufactured Internet of Things (IoT) devices that collect vast amounts of personal data. As lawmakers focus on TikTok's ownership, they overlook the serious risks posed by these devices, which can capture more intimate and real-time data about users' lives than any social media app. This discrepancy raises questions about national security priorities and the need for comprehensive regulations addressing the potential threats from foreign technology in American homes.

US Authorities Begin Releasing some Seized Cryptocurrency Miners, Industry Executives Say Δ1.72

U.S. authorities have begun releasing seized Chinese-made equipment used for cryptocurrency mining, with thousands of units already freed from ports of entry, according to two industry executives. The release of these machines comes amid ongoing trade tensions and security concerns raised by U.S. authorities, although the exact reasons behind their detention remain unclear. The situation highlights the complex relationships between technology companies, governments, and global supply chains.

What Is Quantum Computing and How It Could Change the Tech World Δ1.72

Quantum computing is rapidly advancing as major technology companies like Amazon, Google, and Microsoft invest in developing their own quantum chips, promising transformative capabilities beyond classical computing. This new technology holds the potential to perform complex calculations in mere minutes that would take traditional computers thousands of years, opening doors to significant breakthroughs in fields such as material sciences, chemistry, and medicine. As quantum computing evolves, it could redefine computational limits and revolutionize industries by enabling scientists and researchers to tackle previously unattainable problems.

The Eu's Encryption Proposals Pose Human Rights Risks Δ1.72

The European Union's proposal to scan citizens' private communications, including those encrypted by messaging apps and secure email services, raises significant concerns about human rights and individual freedoms. The proposed Chat Control law would require technology giants to implement decryption backdoors, potentially undermining the security of end-to-end encryption. If implemented, this could have far-reaching consequences for online privacy and freedom of speech.

EU Must ‘Fully’ Apply Its Market Fairness Rulebook on Google, Search Rivals Urge Δ1.72

The European Union is facing pressure to intensify its investigation of Google under the Digital Markets Act (DMA), with rival search engines and civil society groups alleging non-compliance with the directives meant to ensure fair competition. DuckDuckGo and Seznam.cz have highlighted issues with Google’s implementation of the DMA, particularly concerning data sharing practices that they believe violate the regulations. The situation is further complicated by external political pressures from the United States, where the Trump administration argues that EU regulations disproportionately target American tech giants.

Apple Inc.'s Data Center Spending Sparks Concern over Market Dominance Δ1.72

Apple Inc. (NASDAQ:AAPL) has been criticized for its significant spending on data centers, with some analysts questioning whether the investment is necessary and justifiable given the company's market dominance. The massive expenditures have raised concerns about the environmental impact of Apple's expansion into cloud computing and data storage. Apple's dominance in the technology sector has led to worries about the implications of this trend for competition and innovation.

Women's Rights Under Attack and 'We Must Fight Back', Says UN Chief Δ1.72

The United Nations Secretary-General has warned that women's rights are under attack, with digital tools often silencing women's voices and fuelling harassment. Guterres urged the world to fight back against these threats, stressing that gender equality is not just about fairness, but also about power and dismantling systems that allow inequalities to fester. The international community must take action to ensure a better world for all.

Apple Takes Legal Action in UK Data Privacy Row Δ1.72

Apple is taking legal action to try to overturn a demand made by the UK government to view its customers' private data if required, citing concerns over security and privacy. The tech giant has appealed to the Investigatory Powers Tribunal, an independent court with the power to investigate claims against the Security Service. By doing so, Apple seeks to protect its encryption features, including Advanced Data Protection (ADP), from being compromised.

Google Cloud Unveils New AI Protection Security Tools, No Matter Which Model You Use Δ1.72

Google Cloud has launched its AI Protection security suite, designed to identify, assess, and protect AI assets from vulnerabilities across various platforms. This suite aims to enhance security for businesses as they navigate the complexities of AI adoption, providing a centralized view of AI-related risks and threat management capabilities. With features such as AI Inventory Discovery and Model Armor, Google Cloud is positioning itself as a leader in securing AI workloads against emerging threats.

The Computing Industry Faces Rapid Evolution Δ1.71

The computing industry is experiencing rapid evolution due to advancements in Artificial Intelligence (AI) and growing demands for remote work, resulting in an increasingly fragmented market with diverse product offerings. As technology continues to advance at a breakneck pace, consumers are faced with a daunting task of selecting the best device to meet their needs. The ongoing shift towards hybrid work arrangements has also led to a surge in demand for laptops and peripherals that can efficiently support remote productivity.

Apple Appeals to Overturn UK Government's 'Back Door' Order Δ1.71

Apple has appealed a British government order to create a "back door" in its most secure cloud storage systems. The company removed its most advanced security encryption for cloud data, called Advanced Data Protection (ADP), in Britain last month, in response to government demands for access to user data. This move allows the UK government to access iCloud backups, such as iMessages, and hand them over to authorities if legally compelled.

Microsoft Seeks to Expand Ai Chip Exports Amid Biden-Era Restrictions Δ1.71

Microsoft has called on the Trump administration to change a last-minute Biden-era AI rule that would cap tech companies' ability to export AI chips and expand data centers abroad. The so-called AI diffusion rule imposed by the Biden administration would limit the amount of AI chips that roughly 150 countries can purchase from US companies without obtaining a special license, with the aim of thwarting chip smuggling to China. This rule has been criticized by Microsoft as overly complex and restrictive, potentially hindering American economic opportunities.

Us Government's Export Restrictions on Ai Chips Threaten Global Leadership Δ1.71

Microsoft has warned President Trump that current export restrictions on critical computer chips needed for AI technology could give China a strategic advantage, undermining US leadership in the sector. The restrictions, imposed by the Biden administration, limit the export of American AI components to many foreign markets, affecting not only China but also allies such as Taiwan, South Korea, India, and Switzerland. By loosening these constraints, Microsoft argues that the US can strengthen its position in the global AI market while reducing its trade deficit.

China Imposes New Curbs on U.S. Firms as Trade Row Grows Δ1.71

China has imposed retaliatory tariffs and placed export and investment restrictions on 25 U.S. firms on national security grounds, targeting companies involved in advanced technologies and surveillance systems, amidst growing tensions between the two nations over trade and human rights issues. The move aims to restrict access to sensitive technology and limit U.S. influence in strategic sectors. China's actions reflect a broader effort to assert its sovereignty and protect domestic industries from foreign competition.

MWC 2025 — All the B2B News and Announcements From Mobile World Congress Day One Δ1.71

Nokia announces new partnerships for AI-RAN development, teaming up with Nvidia, Softbank and T-Mobile, while PwC research indicates that the telecoms industry is likely to bloom after recent years of growth and increasing demand for 5G services. Microsoft releases a Microsoft Fabric telecoms-focused data model to unify data sources and streamline telco workloads. Vodafone and IBM join forces to enhance mobile phone quantum-safe cryptography using IBM Quantum Safe technology. Capgemini research outlines the priorities of B2B telecoms, including simplified buying processes, customization over cost, and creating and orchestrating an ecosystem.