CIO Jury: Nearly 60% of companies don’t encrypt corporate emails – TechRepublic

Encryptiona process used to convert data from its original form to a format that is unreadable and unusable to anyone without the information needed to reverse itis often meant to prevent third parties from viewing or accessing data.

With the average cost of a data breach at $3.62 million, encryption has been shown to reduce the costs of an incident, according to a study from IBM Security and the Ponemon Institute. The Department of Defense recently announced that it will begin using a stronger email encryption technology starting in July 2018.

"If you're not making use of encryption with your email, you should be," wrote TechRepublic contributing writer Jack Wallen. "More and more sensitive information is being passed between recipients, much of which is being sent in plain-text form. That means one thing: anyone can read it. To thwart that, we turn to encryption technology that promises to obfuscate that sensitive information; and it works."

Despite the benefits, the majority of CIOs said that they are not using encryption for email messaging. When asked "Does your company encrypt emails?" seven members of our CIO Jury panel said no, while five said yes.

SEE: Encryption Policy (Tech Pro Research)

"I think we need 'critical mass' before we start doing this, and we certainly aren't the DoD," said Simon Johns, IT director at Sheppard Robson Architects LLP.

At Shealy Electrical Wholesalers, "long term, we want to implement it, but we have insufficient time and resources at present," said Jeff Focke, director of IT.

"We assume email is insecure communications," said Jeff Kopp, technology coordinator at Christ the King Catholic School.

On the other hand, Dustin Bolander, CIO at Technology Pointe, said his company has been encrypting emails for the past few years "due to regulatory requirements."

Others are newer to the technology. "We just started the process, using Microsoft tools," said Michael Hanken, vice president of IT at Multiquip Inc. "First impressions and feedback look very favorable."

The national conversation around encryption came to a head with the 2015 controversy between Apple and the FBI, in which Apple refused a court order to unlock the iPhone used by the San Bernardino shooter. The Justice Department eventually dropped its case against Apple, as it unlocked the phone with help from an outside party. Since then, a number of states have seen similar cases.

For the average user, encryption can be difficult to figure out, Wallen wrote. But companies can try and simplify encryption for email purposes, using tools such as SecureMyEmail.

This month's CIO Jury included:

Dan Fiehn, group IT director, Markerstudy Group

Michael Hanken, vice president of IT, Multiquip Inc.

Dustin Bolander, CIO, Technology Pointe

Jeff Kopp, technology coordinator, Christ the King Catholic School

Corey Peissig, vice president of technical operations, Optimal Blue

Mark Johns, former director of application systems design and development, Health Partners Plans

Jeff Focke, director of IT, Shealy Electrical Wholesalers

Mike S. Ferris, global IT director of infrastructure, Lincoln Electric

Simon Johns, IT director, Sheppard Robson Architects LLP

Shane Milam, executive director of technology infrastructure services, Mercer University

Gene Richardson, COO, Experts Exchange

Inder Davalur, group CIO, KIMS Hospitals Private Limited

Want to be part of TechRepublic's CIO Jury and have your say on the top issues for IT decision makers? If you are a CIO, CTO, IT director, or equivalent at a large or small company, working in the private sector or in government, and you want to join TechRepublic's CIO Jury pool, click the Contact link below or email alison dot denisco at cbsinteractive dot com, and send your name, title, company, location, and email address.

Image: iStockphoto/Prasit Rodphan

More:
CIO Jury: Nearly 60% of companies don't encrypt corporate emails - TechRepublic

Encryption Software Market to Grow at a CAGR of 17.9% by 2022 – Analysis By Application, Deployment Model … – Business Wire (press release)

DUBLIN--(BUSINESS WIRE)--The "Encryption Software Market - Forecasts from 2017 to 2022" report has been added to Research and Markets' offering.

Global Encryption Software market is projected to grow at a CAGR of 17.93% during the forecast period to grow to US$6.782 billion by 2022, increasing from US$2.974 billion in 2017. Encryption is an effective security mechanism that provides the data security.

The major factor driving the global encryption software market is the growing need to safeguard the critical data from the unauthorized access. Rising cases of cyber-attacks to steal the important organizational data is augmenting the demand for encryption software across enterprises.

Owing to increasing adoption of BYOD policy by various enterprises coupled with stringent cyber security regulations and guidelines is further boosting the growth of this market for secure data transmission. Emerging trend of cloud computing will further bolster the growth of cloud-based encryption software and solutions across SMEs and large enterprises over the next five years.

Geographically, North America held the largest market share in 2016 due to the strong presence of key encryption software vendors in the region. However, APAC region is anticipated to witness the fastest regional market growth during the forecast period. This growth is attributed to increasing number of smartphone and tablet users, growing adoption of social media, and penetration of IoT, cloud services, and implementation of BYOD policies across various enterprises in the region.

Companies Mentioned

Key Topics Covered:

1. Introduction

2. Research Methodology

3. Executive Summary

4. Market Dynamics

5. Global Encryption Software Market Forecast by Application (US$ billion)

6. Global Encryption Software Market Forecast by Deployment Model (US$ billion)

7. Global Encryption Software Market Forecast by Enterprise Size (US$ billion)

8. Global Encryption Software Market Forecast by End User (US$ billion)

9. Global Encryption Software Market Forecast by Geography (US$ billion)

10. Competitive Intelligence

11. Company Profiles

For more information about this report visit https://www.researchandmarkets.com/research/gwjkt9/encryption

See the rest here:
Encryption Software Market to Grow at a CAGR of 17.9% by 2022 - Analysis By Application, Deployment Model ... - Business Wire (press release)

Encryption laws: carrot, not stick, likely to work – iTWire

When Prime Minister Malcolm Turnbull and Attorney-General George Brandis get down to the nitty-gritty of formulating proposed changes to encryption laws which they have talked about, they might like to stop and consider one fact: most tech companies will bend over backwards if they have something to gain from it.

The case of Apple is illustrative. The company earned kudos from champions of personal privacy last year when it put up opposition to an FBI move to gain access to the contents of an iPhone which had been used by one of the terrorists involved in an incident in San Bernardino, California.

Annoyed by the FBI's move to take the matter to the courts, without first quietly approaching the company, Apple put up stiff resistance.

But the same Apple has now announced plans for opening a new data centre in China in order to comply with the government's demands to store Chinese customer data within the country. Despite the cost and inconvenience, Apple realises that there is a lot of money to be made in China.

Take the example of Microsoft. In May, the company released a version of its Windows operating system known as Windows 10 China Government Edition, a version vetted by the Beijing authorities and deemed suitable for use by the country's public sector.

There is plenty of money to be made by supplying operating systems to China's public sector; given that Microsoft was willing to show its crown jewels to the authorities. Money does indeed make the mare go.

One could go on. Practically every big tech company jumps through hoops when there is a pot of gold on the other side. Google, Facebook, Amazon, Yahoo!, they all say one thing in public, but buckle down to government demands provided there is something in it for them.

Given this, Turnbull and Brandis might like to think of some carrots that they can dangle in front of the tech companies whose encrypted products they are seeking access to. Wielding a stick, as Turnbull has done thus far, is unlikely to help.

Would your office survive without a phone, fax or email?

Avoid disruption and despair for your business.

Learn the NBN tricks and traps with your FREE 10-page NBN Business Survival Guide

The NBN Business Survival Guide answers your key questions:

When can I get NBN? Will my business phones work? Will fax & EFTPOS be affected? How much will NBN cost? When should I start preparing?

DOWNLOAD NOW!

Original post:
Encryption laws: carrot, not stick, likely to work - iTWire

IBM Z provides a simple way to encryption and fight Cybercrime – Irish Tech News

By Oscar Michel, Masters in Journalism, DCU

IBM unveiled on IBM Z, the next generation of the worlds most powerful transaction system, capable of running more than 12 billion encrypted transactions per day.

With IBM Z it is now possible to encrypt data associated with any apps, clouds or database.

The launch of IBM Z that took place in Armonk, NY on July 17th ushers in new era of data protection. $8 trillion of the global economy will be stolen via cybercrime by 2022. Since 2013, 9 billion data records were lost or stolen. Only 4% of the data records were encrypted making the data vulnerable to theft.

The vast majority of stolen or leaked data today is in the open and easy to use because encryption has been very difficult and expensive to do at scale. We created a data protection engine for the cloud era to have a significant and immediate impact on global data security said Ross Mauri, General Manager of IBM Z.

The main issue with encryption is that it can degrade the performance and therefore the users experience and can be too complex and expensive to manage. Only 2% of corporate data is encrypted today.

IBM Z brings significant advances in cryptography technology, building on a proven encryption platform that safeguards the worlds banking, healthcare, government and retail systems. IBM Z pervasive encryption delivers breakthroughs including Pervasive encryption of data at all times, tamper-responding encryption keys and encrypted APIs.

The General Data Protection Regulation(GDPR) will require organisations to report data breaches to the regulatory authority within 72 hours and face fines of up to 4% of annual worldwide revenues or 20 million Euro, unless the organisation can demonstrate that data was encrypted and the keys were protected.

The US Federal Institutions Examination Council (FFIEC) provides guidance on the use of encryption. Singapore and Hong Kong has done the same.The New York State Department of Financial Services published requirements regarding encryption in the Cybersecurity Requirements for Financial Services Companies.

The war against cybercrime has started and encryption is the solution.

IBM Z also created the most secure Blockchain Service byrunning IBM Blockchain services to provide the highest commercially available levels of cryptographic hardware.

The powerful combination of IBM Z encryption and secure containers differentiates IBM Blockchain services on the cloud by supporting the trust models new blockchain networks require, said Marie Wieck, general manager, IBM Blockchain. Enterprise clients also benefit from the ease of use making management transparent to the application and the user.

Regarding to the Transaction System for the Cloud Era, enormous amountsof sensitive data produced by transactions can now be better protected against fraud and cybercrime, analysed, and monetised using IBM Z. Encryption will be easy, fast and wont impact to service level agreements.

IBM has also announced new Container Pricing models for IBM Z. Microservices and applications will enable clients to maximise the value from security-rich on premises entreprise systems in real time.Application development and test with the freedom to triple capacity of all development environments on z/OS to support latest DevOps tooling and processes.Payment systems pricing based on the business metric of payments volume a bank processes, not the available capacity.

If you would like to have your company featured in the Irish Tech News Business Showcase, get in contact with us at [emailprotected] or on Twitter: @SimonCocking

BankingBlockchainBusinessCloudDataHackingIBMIBM ZInternetSecurity

Visit link:
IBM Z provides a simple way to encryption and fight Cybercrime - Irish Tech News

Quantum Cryptography System Breaks Daylight Distance Record – IEEE Spectrum

Satellites can now set up quantum communications links through the air during the day instead of just at night, potentially helping a nigh-unhackable space-based quantum Internet to operate 24-7, a new study from Chinese scientists finds.

Quantum cryptography exploits the quantum properties of particles such as photons to help encrypt and decrypt messages in a theoretically unhackable way. Scientists worldwide are now endeavoring to develop satellite-based quantum communications networks for a global real-time quantum Internet.

However, prior experiments with long-distance quantum communications links through the airwere mostly conducted at night because sunlight serves as a source of noise. Previously, the maximum range for day-time free-space quantum communication was 10 kilometers,says study co-senior author Qiang Zhang, a quantum physicist at the University of Science and Technology of China in Shanghai.

Now researchers led by quantum physicist Jian-Wei Pan at the University of Science and Technology of China at Hefei have successfully established 53-kilometer quantum cryptography links during the day between two ground stations. This research suggests that such links could work between a satellite and either a ground station or another satellite, they say.

To overcome interference from sunlight, the researchers switched from the roughly 700-to-900-nanometer wavelengths of light used in all prior day-time free-space experiments to roughly 1,550 nm. The sun is about one-fifth as bright at 1,550 nanometers as it is at 800 nanometers, and 1,550-nanometer light can also pass through Earth's atmosphere with virtually no interference. Moreover, this wavelength is also currently widely used in telecommunications, making it more compatible with existing networks.

Previous research was reluctant to use 1,550-nanometer light because of a lack of good commercial single-photon detectors capable of working at this wavelength. But the Shanghai group developed a compact single-photon detector for 1,550-nanometer light that could work at room temperature. Moreover, the scientists developed a receiver that needed less than one tenth of the field of view that receivers for night-time quantum communications links usually need to work. This limited the amount of noise from stray light by a factor of several hundred.

In experiments, the scientists repeatedly established quantum communications links across Qinghai Lake, the biggest lake in China, from 3:30 p.m. to 5 p.m. local time on several sunny days, achieving transmission rates of 20 to 400 bits per second. Furthermore, they could establish these links despite roughly 48 decibels of loss in their communications channel, which is more than the roughly 40 to 45 decibels of loss typically seen in communications channels between satellites and the ground and between low-Earth-orbit satellites, Zhang says. In comparison, previous day-time free-space quantum communications experiments could only accommodate roughly 20 decibels of noise.

The researchers note that their experiments were performed in good weather, and that quantum communication is currently not possible in bad weather with todays technology. Still, they note that bad weather is only a problem for ground-to-space links, and that it would not pose a problem for links between satellites.

In the future, the researchers expect to boost transmission rates and distance using better single-photon detectors, perhaps superconducting ones. They may also seek to exploit the quantum phenomenon known as entanglement to carry out more sophisticated forms of quantum cryptography, although this will require generating very bright sources of entangled photons that can operate in a narrow band of wavelengths, Zhang says.

The scientists detailed their findings online 24 July in the journal Nature Photonics.

IEEE Spectrums general technology blog, featuring news, analysis, and opinions about engineering, consumer electronics, and technology and society, from the editorial staff and freelance contributors.

Sign up for the Tech Alert newsletter and receive ground-breaking technology and science news from IEEE Spectrum every Thursday.

Two quantum leaps in quantum communication 9Nov2015

In two new trials, satellites set distance records for beaming photons usable in quantum crypto 21Jul

Draft Defense Authorization Act includes $15 million for national rollout of Stanford-originated Hacking for Defense class 25Jul

Inexpensive and small, this GPS receiver turbocharged the market for integrated navigation in mobile devices 30Jun

Record distance for quantum entanglement set at more than 1,200 km 15Jun

Dust-sized micrometeroids can cause an EMP "like a mini-nuke" that could wreck satellite electronics 3May

Facebook's Yael Maguire talks about millimeter wave networks, Aquila, and flying tethered antennas at the F8 developer conference 19Apr

NASAs new geosensing satellites may be on the chopping block. The timing could hardly be worse 24Mar

NASAs new geosensing satellites may be on the chopping block. The timing could hardly be worse 9Mar

The RSGS spacecraft could visit and inspect dozensofsatellites 8Mar

India plans to launch 103 satellites at once next month; Spaceflight Industries is launching a system for 87 in February 4Jan

Stanford students meet with John Kerry, U.S. State Department officials, and diplomats from around the world as they take on real-world problems 21Dec2016

Computer models combine daytime satellite images, nighttime lighting, and survey data to estimate poverty levels 18Aug2016

The mission will test quantum linksin principle unhackablebetween space and the ground 16Aug2016

Polish-less technology also offers "smart optics" for deforming the mirror in different telescope orientations 14Jul2016

Is this solar-powered remote plant monitor the most sensor-packed gadget on the Internet of Things? 12Jul2016

Claire, a Canadian microsatellite launched in June, is gearing up to take high-res snapshots of greenhouse gas plumes 5Jul2016

Claire, a Canadian microsatellite launched in June, is gearing up to take high-resolution snapshots of greenhouse gas plumes 5Jul2016

Eyeing the space boom, the company plans to launch a constellation of CubeSats 27Jun2016

Hundreds of threatened and endangered turtles wash ashore in Chesapeake Bay each year, and no one knows why 20Jun2016

Continued here:
Quantum Cryptography System Breaks Daylight Distance Record - IEEE Spectrum

SK Telecom Develops Quantum Cryptography Chip for IoT – SDxCentral

SK Telecom is adding a new level of security to the Internet of Things (IoT) by embedding a small quantum random number generator (QRNG) chip into its IoT devices. QRNG chips generates random numbers without any pattern, which is intended to increase the level of security.

The South Korean operator also said that its QRNG chip will be just 5 millimeters (mm) by 5 mm in size, making it small enough to embed in a variety of devices.

According to Sam Hale, analyst with MachNation, hardware-based random number generation, like the QRNG chip, has existed for some time and is already largely deployed in some business sectors. In fact, Hale said that random number generators (of which QRNG is a subset), have existed in various formats for decades and Intel currently uses this type of technology for its Intel Secure Key brand.

The benefit to IoT is that QRNG ensures common encryption methods cannot be broken due to weaknesses within their random number generators. The QRNG technology magnifies very small scale quantum uncertainties to a much larger scale.

SK Telecom has not yet determined the price of its QRNG chips, but said that it will work with partners to accelerate the popularity of QRNG and increase its presence in the market.

However, Hale said that SK may have some difficulty getting traction for its QRNG chip as both Intel and ARM, which currently produce the majority of IoT processors, already use competing technologies or have QRNG technology already embedded in them.

SK Telecom has been investing heavily in IoT. The company said earlier this year that it would invest $9 billion over the next three years in artificial intelligence (AI), IoT, autonomous vehicles, and 5G.

Sue is VP of Content and Editor-in-Chief at SDxCentral. Sue covers 5G and IoT for SDxCentral as well as overseeing all the editorial content on the site. Prior to SDxCentral, Sue was the Editor-in-Chief of FierceMarkets Telecom Group. Sue has more than 20 years of experience reporting on the telecom industry, including roles as the Executive Editor at Wireless Week and Managing Editor at Convergence magazine. She has also worked as an analyst for Paul Kagan Associates, specializing in wireless and broadband technologies. She can be reached at smarek@sdxcentral.com

The rest is here:
SK Telecom Develops Quantum Cryptography Chip for IoT - SDxCentral

China set to launch ‘unhackable’ messaging network using quantum cryptography – International Business Times UK

China is set to launch a new "unhackable" communications network built upon cutting-edge quantum cryptography, promising to revolutionise the process of encryption. State media said the city of Jinan will be "the first in the world" to use the secure technology in government.

Scientists claimed the network, which reportedly cost 120m yuan ($19.5m, 15m) to construct, will connect government offices in the city. Roughly 50 rounds of testing indicated it will be capable of encrypting more than 4,000 pieces of data every second, China Daily reported.

It will be used by 200 users across Jinan's government, finance and military departments, state media said. Experts from the Institute of Quantum Technology located in Jinan revealed the revolutionary network would be rolled out by August later this year.

Unlike the encryption of today, quantum-based networks send messages inserted into particles of light.

The "unhackable" claim comes from the fact that if anyone attempts to break into the network the particles will change and the message will be destroyed.

"We plan to use the network for national defence, finance and other fields, and hope to spread it out as a pilot that if successful, can be used across China and the whole world," said Zhou Fei, assistant director of Jinan Institute of Quantum Technology, as noted by the Financial Times.

It's not the first time China has invested in quantum tech. Last year it launched a "hack-proof" communications satellite, which was put on a two-year mission to help develop stronger communications at speeds "faster than light".

Many other nations have been reluctant to invest in such systems at scale, but why?

"For a long time people simply didn't think it was needed," Professor Myungshik Kim of Imperial College, London, told the BBC. "The mathematical difficulty of the current coding system was so high that it was not thought necessary to implement the new technology."

Now, it appears that China is leading the charge. "While nothing can truly be deemed as 'unhackable', new and radical approaches are very much needed to help secure technology and communications," said Javvad Malik, an expert at security firm AlienVault.

He added: "Having applications utilising technologies that make them more difficult to hack, or can detect quickly and reliably when a compromise has occurred is always a welcome addition and one would hope to see such improvements in all new technologies and national infrastructure."

Andrew Clarke, director at security firm One Identity, said that the promise of quantum technology continued to be a "bright spot on the horizon".

He elaborated: "The latest experiments in China have adopted satellite systems and increased wavelengths to establish quantum cryptography links during the day.

"The concept behind the technology is that if there is any interference in the communication such as an attacker trying to steal an encryption key then the quantum mechanics theory indicates that the key would immediately change to prevent that from being successful.

"At this stage, the experiments involve point-to-point encrypted communication, but when extended could provide a new approach to wider communications between multiple trusted parties.

"It will require much more research; experimentation and investment to extend to wider use; boost transmission rates and distance. This is certainly a step in the right direction to address global security concerns concerning public internet use."

Read more

Original post:
China set to launch 'unhackable' messaging network using quantum cryptography - International Business Times UK

A brief history of Alice & Bob, cryptography’s first couple – Boing Boing

Alice and Bob are the hypothetical communicants in every cryptographic example or explainer, two people trying to talk with one another without being thwarted or overheard by Eve, Mallory and their legion of nefarious friends.

Alice and Bob's first known appearance was in Rivest, Shamir, and Adleman's 1978 Communications in the ACM paper, A Method for Obtaining Digital Signatures and Public-key Cryptosystems." Since then, they have enjoyed many adventures.

The potted history of Alice and Bob at Cryptocouple is a delightful way to explore the history of crypto and the way we think about secrecy and privacy.

Alice and Bob are the worlds most famous cryptographic couple. Since their invention in 1978, they have at once been called inseparable, and have been the subject of numerous divorces, travels, and torments. In the ensuing years, other characters have joined their cryptographic family. Theres Eve, the passive and submissive eavesdropper, Mallory the malicious attacker, and Trent, trusted by all, just to name a few.

While Alice, Bob, and their extended family were originally used to explain how public key cryptography works, they have since become widely used across other science and engineering domains. Their influence continues to grow outside of academia as well: Alice and Bob are now a part of geek lore, and subject to narratives and visual depictions that combine pedagogy with in-jokes, often reflecting of the sexist and heteronormative environments in which they were born and continue to be used. More than just the worlds most famous cryptographic couple, Alice and Bob have become an archetype of digital exchange, and a lens through which to view broader digital culture.

Alice & Bob A History of The Worlds Most Famous Cryptographic Couple [Cryptocouple]

This week on HOME: Stories From L.A.:The original Forest Lawn Memorial Park, in the hills above Glendale, may be best known outside California for inspiring the sledgehammer satire of the 1965 cult comedyThe Loved One. For tourists and curiosity-seekers, its the gonzo lifes work of Hubert Eaton, who memorialized himself as The Builder in the []

The Awakening by Henry Mayer is considered one of the finest pieces of political art of the 20th-century and is often mentioned as the most beautiful of the suffrage maps. American women earned the vote from west to east before the right became federal law.

From Business Insider; mostly unappetizing. Pictured here is the 17th century watermelon, as cropped from Giovanni Stanchis c. 1650s painting. They look rough, but would have tasted great. The watermelon originally came from Africa, but after domestication it thrived in hot climates in the Middle East and southern Europe. It probably became common in European []

Whether youre a seasoned entertainment industry veteran or a student working on your first spec script, having the right tool for the job will make a huge difference in your focus and productivity.Final Draft 10 is far and away the worlds best screenwriting software, used extensively by professional film and TV writers at top production []

Web content creators who dont have a solid SEO strategy should take note of Webtexttool. Its a service that pulls in anonymous data from their entire user base to offer crowdsourced guidance that increases your search page ranks. By analyzing prior user successes, it helps you better gauge how your posts will perform at a []

Just because English has become the common global tongue doesnt mean its the easiest language to writeeven for native speakers. If youre looking to improve your written communication skills, especially on your smartphone, take a look at Ginger Page.Ginger is a cross-platform app that offers corrections for phrasing as well as grammar. Its powered by []

Read more here:
A brief history of Alice & Bob, cryptography's first couple - Boing Boing

The 5 Craziest Moments in Showtime’s Julian Assange Documentary, ‘Risk’ – Decider

Though the Wikileaks founder is likely best known for his ties to Chelsea Manning, Edward Snowden, and the Hillary Clinton email dump last fall, much of the documentary actually revolves around Assanges response to the sexual assault allegations that have been levied against him. Assange visited Sweden in 2010, and soon afterwards he was accused of two counts of sexual molestation, one count of unlawful coercion and one count of lesser-degree rape. In May of this year, the charges were dropped against Assange with authorities claiming they could not expect the Ecuadorian embassy to communicate reliably with Assange.

Since Risk was filmed over the course of six years, the sexual assault case is referenced fairly consistently. At one point, to the chagrin of his lawyer, Assange claims the whole case is actually a feminist-led conspiracy designed to discredit him. He also makes the comment that the case is difficult because, since there are two women, its harder to discredit them. Its truly a bizarre moment that helps to paint Wikileaks organization of hackers as a sexist organization.

See the original post:
The 5 Craziest Moments in Showtime's Julian Assange Documentary, 'Risk' - Decider

HRM: Julian Assange notices something interesting about Kurt Eichenwald’s Twitter bio – Twitchy

Hrm. Interesting indeed.

It would appear that Kurt Eichenwald has removed the word Newsweek from his Twitter bio.

Assange went on:

Could this be why?

From Paste:

The lawsuit was settled amicably and to my satisfaction, Moran toldPaste. After the settlement, the stories were removed, the parties agreed not to speak about the terms of the settlement, so I cant talk to you about what the settlement entails.

When asked how it felt to finally be done with the whole affair, Moran would only say he was relieved.

Our institutions actually do work, he said, a pensive look creeping over his face. I was a young journalist with no power, but the facts were on my side, and the system worked. Our institutions are made to last.

Newsweeks policy apparently kept them from commenting on this particular story.

Wonder what brought all of this on in the first place with Assange:

Oh dude.

Yeah, this will end well. *popcorn*

At least its not tentacle porn this time, Kurt.

Related:

Identity politics FAIL: Lefties attack 3 black women for being successful business owners

Read more:
HRM: Julian Assange notices something interesting about Kurt Eichenwald's Twitter bio - Twitchy