OPM train wreck stacks up more rail cars
Cyber theft episode writing manual on how not to handle a breach
View ArticleWindows 10 next up to try igniting cultural shift around authentication
End-users are key to security breakthroughs but they need usability and simplicity as much as innovation
View ArticleFederal Court's data breach decision shows new tilt toward victims,...
Federal courts beginning to recognize possibility of on-going harm to those who lose financial, personal data in a breach
View ArticleDream of Internet freedom dying, Black Hat keynoter says
Director of Civil Liberties at the Stanford Center for Internet and Society tells crowd to push for equality, decentralization, end-to-end encryption to revive promise of global network
View ArticleFTC closes investigation into Morgan Stanley hack
Agency lauds firm for data protection policies, quick response to employee theft of 350,000 records
View ArticleCourts and crooks creating force that may redefine a secure digital landscape
Courts and regulators challenging precedent involving security-lax companies, hackers showing users the value of their private data
View ArticleBig hacks, big data add up to blackmailer's dream
Do the data records stolen in a pair of recent hacks signal the start of something more sinister?
View ArticleHackers gain entry to 10 million Excellus insurance records
Insurance provider says attack began nearly two years ago before being discovered last week
View ArticleNSTIC commits $3.7 million to new round of identity pilot programs
Emphasis is on privacy-enhancing technology with focus on taxes, medical information, data storage
View ArticleU.S. intelligence chief splitting breach hairs, while courts seek clarity
Clapper's story again unclear as federal courts and agencies re-examine breach decisions with eye on liability, victims' rights
View ArticleFirm's sloppy cybersecurity results in SEC action, fine
Lack of pro-active defenses throwing companies into legal trouble post-breach regardless if data stolen or not
View ArticleYahoo only the latest at "kill the password" altar
Industry looking to improve access controls and authentication, but decisions still governed by security requirements, use cases, hacker disruption
View ArticleGroup building bridge between identity, strong authentication standards
Focus is on enterprises, service providers mixing and matching standardized identity and access controls
View ArticleThere's no room in authentication for amateurs
000Webhost hack shows sloppy practices by identity providers rob end-users of any defenses
View ArticleThird arrest made in TalkTalk breach
English police take 20-year-old man into custody in connection with alleged hack
View ArticleMega breaches having little influence on IT priorities
451 Research survey shows IT project plans lightly influenced by breaches despite concerns about hackers, crackers with malicious intent
View ArticleLabMD breach case more fuel for on-going-harm debate
When, and how many times, is a consumer harmed in a data breach and when does liability end for the company breached?
View ArticleAuthentication advances put 2016 light at end of breach tunnel
Savvy consumers, companies willing to shed bad habits can fight back with secure access options in 2016
View ArticleFCC, Cox Communications agree to $595,000 breach settlement
Cox failed to report incident that led to first-ever FCC privacy, data security enforcement action with a cable operator
View ArticleDigital business, hackers driving next wave of identity innovation
Evolving tools and challenges fostering close coupling of identity, access management with business goals
View Article