Close Menu
geekfence.comgeekfence.com
    What's Hot

    Wealth management outlook for 2026: trends and sourcing implications 

    February 9, 2026

    T-Mobile US’ switching strategy lands in court again

    February 9, 2026

    Scientists create smart synthetic skin that can hide images and change shape

    February 9, 2026
    Facebook X (Twitter) Instagram
    • About Us
    • Contact Us
    Facebook Instagram
    geekfence.comgeekfence.com
    • Home
    • UK Tech News
    • AI
    • Big Data
    • Cyber Security
      • Cloud Computing
      • iOS Development
    • IoT
    • Mobile
    • Software
      • Software Development
      • Software Engineering
    • Technology
      • Green Technology
      • Nanotechnology
    • Telecom
    geekfence.comgeekfence.com
    Home»UK Tech News»Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns – Computerworld
    UK Tech News

    Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns – Computerworld

    AdminBy AdminJanuary 26, 2026No Comments1 Min Read1 Views
    Facebook Twitter Pinterest LinkedIn Telegram Tumblr Email
    Microsoft handed over BitLocker keys to law enforcement, raising enterprise data control concerns – Computerworld
    Share
    Facebook Twitter LinkedIn Pinterest Email



    Enterprises should ensure strict access control and separation of duties. “Only a small, vetted group such as security operations, endpoint engineering, should have rights to view or export recovery keys. Approvals should be workflow-based, not ad hoc. Every key retrieval should leave an auditable, immutable trail, and ideally be tied to an incident or ticket ID,” said Jaju.

    CISOs should also ensure that when devices are repurposed, decommissioned, or moved across jurisdictions, keys should be regenerated as part of the workflow to ensure old keys cannot be used.

    Gogia warned of the long tail of insecure setups. Personal accounts linked during provisioning, or BYOD devices that silently sync keys to consumer dashboards, are invisible pathways for leakage. “If those keys sit outside your boundary, you no longer have a clean chain of custody. That’s not a theoretical risk. It’s something auditors are now actively checking,” he said.



    Source link

    Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

    Related Posts

    Wealth management outlook for 2026: trends and sourcing implications 

    February 9, 2026

    Irish buyers continue move to electric vehicles as momentum builds in Ireland’s transition

    February 8, 2026

    After years of warnings, Microsoft is finally pulling the plug on EWS – Computerworld

    February 7, 2026

    How to watch Wuthering Heights for free in the UK and US

    February 6, 2026

    The agentic enterprise: How autonomous agents will reshape growth services 

    February 5, 2026

    From Classrooms to Careers: Dell Simplifies Learning With Purpose-Built Education PCs and Future-Ready Programs

    February 4, 2026
    Top Posts

    Hard-braking events as indicators of road segment crash risk

    January 14, 202617 Views

    Understanding U-Net Architecture in Deep Learning

    November 25, 202512 Views

    Achieving superior intent extraction through decomposition

    January 25, 20268 Views
    Don't Miss

    Wealth management outlook for 2026: trends and sourcing implications 

    February 9, 2026

    Global wealth management is entering a defining phase in 2025-2026 as firms scale their businesses…

    T-Mobile US’ switching strategy lands in court again

    February 9, 2026

    Scientists create smart synthetic skin that can hide images and change shape

    February 9, 2026

    AI Shows How Payment Delays Disrupt Your Business

    February 9, 2026
    Stay In Touch
    • Facebook
    • Instagram
    About Us

    At GeekFence, we are a team of tech-enthusiasts, industry watchers and content creators who believe that technology isn’t just about gadgets—it’s about how innovation transforms our lives, work and society. We’ve come together to build a place where readers, thinkers and industry insiders can converge to explore what’s next in tech.

    Our Picks

    Wealth management outlook for 2026: trends and sourcing implications 

    February 9, 2026

    T-Mobile US’ switching strategy lands in court again

    February 9, 2026

    Subscribe to Updates

    Please enable JavaScript in your browser to complete this form.
    Loading
    • About Us
    • Contact Us
    • Disclaimer
    • Privacy Policy
    • Terms and Conditions
    © 2026 Geekfence.All Rigt Reserved.

    Type above and press Enter to search. Press Esc to cancel.