Close Menu
geekfence.comgeekfence.com
    What's Hot

    F1 on Apple TV: How to Watch Australian Grand Prix 2026

    March 6, 2026

    The Download: an AI agent’s hit piece, and preventing lightning

    March 6, 2026

    Microsoft Expands Windows 365 with New Cloud PC Devices from ASUS and Dell

    March 6, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»UK Tech News»Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns – Computerworld
    UK Tech News

    Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns – Computerworld

    AdminBy AdminJanuary 26, 2026No Comments1 Min Read1 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns – Computerworld
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Enterprises should ensure strict access control and separation of duties. “Only a small, vetted group such as security operations, endpoint engineering, should have rights to view or export recovery keys. Approvals should be workflow-based, not ad hoc. Every key retrieval should leave an auditable, immutable trail, and ideally be tied to an incident or ticket ID,” said Jaju.

    CISOs should also ensure that when devices are repurposed, decommissioned, or moved across jurisdictions, keys should be regenerated as part of the workflow to ensure old keys cannot be used.

    Gogia warned of the long tail of insecure setups. Personal accounts linked during provisioning, or BYOD devices that silently sync keys to consumer dashboards, are invisible pathways for leakage. “If those keys sit outside your boundary, you no longer have a clean chain of custody. That’s not a theoretical risk. It’s something auditors are now actively checking,” he said.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    F1 on Apple TV: How to Watch Australian Grand Prix 2026

    March 6, 2026

    Everest Group Top 50™ Core Banking Technology Providers 2026: why coexistence, AI readiness, and composability now define core banking 

    March 5, 2026

    Mara Blue Launches Feasibility Study for Ireland’s First Marine Biorefinery in Castletownbere

    March 4, 2026

    Apple unveils its next-gen M5 family of Mac laptops – Computerworld

    March 3, 2026

    Ghosts: The Possession of Button House Potential Release Date, Plot And Cast

    March 2, 2026

    From demos to scalable agents: operationalizing AI agents with ADLC 

    March 1, 2026
    Top Posts

    Hard-braking events as indicators of road segment crash risk

    January 14, 202619 Views

    Understanding U-Net Architecture in Deep Learning

    November 25, 202518 Views

    How to integrate a graph database into your RAG pipeline

    February 8, 202610 Views
    Don't Miss

    F1 on Apple TV: How to Watch Australian Grand Prix 2026

    March 6, 2026

    Summary created by Smart Answers AIIn summary:Tech Advisor explains how Apple TV offers F1 Australian…

    The Download: an AI agent’s hit piece, and preventing lightning

    March 6, 2026

    Microsoft Expands Windows 365 with New Cloud PC Devices from ASUS and Dell

    March 6, 2026

    Hackers Used New Exploit Kit to Compromise Thousands of iPhones

    March 6, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    F1 on Apple TV: How to Watch Australian Grand Prix 2026

    March 6, 2026

    The Download: an AI agent’s hit piece, and preventing lightning

    March 6, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.