Close Menu
geekfence.comgeekfence.com
    What's Hot

    World ID expands its ‘proof of human’ vision for the AI era – Computerworld

    April 19, 2026

    Francis Bacon and the Scientific Method

    April 19, 2026

    War in the Middle East, Damaged Data Centers, and Cloud Disruptions

    April 19, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»UK Tech News»Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns – Computerworld
    UK Tech News

    Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns – Computerworld

    AdminBy AdminJanuary 26, 2026No Comments1 Min Read1 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns – Computerworld
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Enterprises should ensure strict access control and separation of duties. “Only a small, vetted group such as security operations, endpoint engineering, should have rights to view or export recovery keys. Approvals should be workflow-based, not ad hoc. Every key retrieval should leave an auditable, immutable trail, and ideally be tied to an incident or ticket ID,” said Jaju.

    CISOs should also ensure that when devices are repurposed, decommissioned, or moved across jurisdictions, keys should be regenerated as part of the workflow to ensure old keys cannot be used.

    Gogia warned of the long tail of insecure setups. Personal accounts linked during provisioning, or BYOD devices that silently sync keys to consumer dashboards, are invisible pathways for leakage. “If those keys sit outside your boundary, you no longer have a clean chain of custody. That’s not a theoretical risk. It’s something auditors are now actively checking,” he said.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    World ID expands its ‘proof of human’ vision for the AI era – Computerworld

    April 19, 2026

    Oppo Find X9s Gets Global Launch Alongside Ultra

    April 18, 2026

    Crisis is the new normal: Everest Group finds 80% of organizations expect AI ROI – but execution gaps threaten outcomes in 2026 

    April 17, 2026

    Microsoft’s Windows Recall still allows silent data extraction – Computerworld

    April 16, 2026

    Game of Thrones: Aegon’s Conquest Potential Release Date, Plot, Cast And News

    April 15, 2026

    Infosys acquires Optimum Healthcare IT: bridging the provider gap and entering the Epic services arena

    April 14, 2026
    Top Posts

    Understanding U-Net Architecture in Deep Learning

    November 25, 202530 Views

    Hard-braking events as indicators of road segment crash risk

    January 14, 202625 Views

    Redefining AI efficiency with extreme compression

    March 25, 202624 Views
    Don't Miss

    World ID expands its ‘proof of human’ vision for the AI era – Computerworld

    April 19, 2026

    How ‘proof of human’ works Billed as the infrastructure for the age of AI, World…

    Francis Bacon and the Scientific Method

    April 19, 2026

    War in the Middle East, Damaged Data Centers, and Cloud Disruptions

    April 19, 2026

    How Much Coding Is Required To Work in AI and LLM-related Jobs?

    April 19, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    World ID expands its ‘proof of human’ vision for the AI era – Computerworld

    April 19, 2026

    Francis Bacon and the Scientific Method

    April 19, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.