NIST blog clarifies SMS deprecation in wake of media tailspin
Agency goal is two-factor authentication for all levels of security assurance, but SMS is not on preferred factor list
View ArticleSwirlds releases software development kit for its blockchain alternative
Kit includes browser OS, source code, and guidelines for writing and running new apps
View ArticleDoD CIO moving over to OPM
Office of Personnel Management still reeling from last year's massive theft of 21 million records
View ArticleClinic won't pay breach protection for victims; CEO says it would be death of...
Is Death by Breach a real affliction to be feared by mid-sized, small businesses?
View ArticleBreaches showing patterns of both desirable, questionable characteristics
Strides are being made, but hackers still winning the battles
View ArticleNew rules could mean hell to pay for small healthcare breaches
Government widens compliance net, will now more aggressively investigate breaches of less than 500 records
View ArticleMajority of consumers fear compromise of their personal data, survey says
Survey shows 83 percent of respondents share concern over ID theft within one to two years.
View ArticleDisclosure investigations newest narrative in enterprise breach forensics
Enterprises risk becoming part perpetrator based on their reporting on hacks
View ArticleUK banking chief raises concerns over security of biometric authentication
Kaspersky Lab research finds 12 skimmers for sale that steal fingerprints, could pose threats to ATM banking
View ArticleDoubt shaping up as the most sinister hack consequence
​Enterprises should be taking notes, as cyber warfare in the US election is revealing the kill-shot tactics of hacking.
View ArticleStandards group working on ID federation recipes to ease implementation
Goal is to cut complexity in rolling out federation for cloud-based identity and access management
View ArticleHealthcare's paltry tech coffers put industry in hacker crosshairs
Aging, outdated systems make techniques such as ransomware common and hard to defend
View ArticlePasswords have a dopey equal in Things on the Internet
The novelty of connected devices spawns a Frankenstein of network killers and a list of questions
View ArticleCloud, device proliferation, bad guys forcing evolutions in identity
Security, privacy, governance, analytics all part of story for next wave of identity and access management
View Article2016 was year of progress vs. pilfering
FBI, Apple set tone for year that saw progress in on-going attempt to devise better access controls
View ArticleFlorida court says password disclosure not protected by Fifth Amendment
Ruling contradicts earlier cases, could have broader implications for digital age, recognized data-protection methods
View ArticleHacks battered IT optimism in 2016; can 2017 enrich defenses
Awareness, standards, innovation key pieces of formula that could deliver better identity, access management
View ArticleChrome will soon mark some HTTP pages as 'non-secure'
Google's first wave of security changes to convert webmasters to encrypted HTTPS target pages that ask for login data or credit card information.
View ArticleIn fight to improve authentication, no one is home at DHS
Agency's report cites compromised-password threat but mitigation advice barely acknowledges best defense against most common, costly attack
View ArticleIdentity experts forming non-profit professional organization
Goal is to offer community, services, information sharing, certifications to those building identity systems
View Article