This story is part of , our full coverage of the latest news from Apple headquarters.
Apple’s next iPhone may come in blue, according to a last-minute rumor from well-known device leaker Evan Blass, who posted that tidbit to the internet shortly before the company’s.
In his post on the app Voice, which pitches itself as an alternative social network to Twitter that authenticates people are real, Blass showed off what appear to be Apple marketing images for the iPhone 12 Pro Max. He said the phones would come in blue, gold, graphite and silver. Apple didn’t immediately respond to a request for comment.
The new devices, which are being called the iPhone 12 by the Apple community though the company hasn’t confirmed their names, are expected to be announced Tuesday alongside a possible new smaller smartphone,, as well as a , among other things.
CNET’s editors will be covering the event live as it happens, and you can follow along.
Richard Tracy, CSO of Telos Corporation, is a 33-year cyber industry veteran and security and compliance expert.
According to Security Boulevard, “More often than not, enterprise data is safer within the cloud.” I’ve agreed with this sentiment for some time, making the case as early as 2011 that cloud providers offer better security than many organizations can achieve on their own via premises-based facilities and resources. Economies of scale, rapid innovation and standard security tooling — all available within the cloud — can improve security for most companies. However, for many organizations, cloud technology is unfamiliar, and roles and responsibilities are not clearly defined by the cloud service provider (CSP) or understood by the cloud user.
In recent years, news headlines regarding cloud-based data breaches would suggest that storing data in the cloud is inherently insecure, but these headlines do not always convey the entire story. More often than not, cloud-based breaches are not the fault of the CSP. Instead, they are the result of user error or inexperience. Users are not always aware of their security responsibilities when it comes to cloud deployments, and it’s possible to make honest mistakes when it comes to a new technology that is sometimes marketed as an autopilot solution in itself.
Speaking of autopilot, let’s look at the increased adoption of driver-assisted technology in everyday vehicles. There have been legitimate concerns and subsequent studies conducted regarding the safety of these features when it comes to driver vigilance. While there are many benefits to these technologies, such as adhering to speed limits and driver comfort, one particular study found there was a decline in driver attention — essentially, a false sense of security set in, resulting in accidents and loss of life. Is this the fault of the manufacturer, or is it