Identity & Access

Identity & Access news, information, and how-to advice

whatsapp ios

Schneier: Internet has delivered a ‘golden age of surveillance’

Security guru Bruce Schneier talks about power and privacy when there is no limit on the amount of data that can be collected, stored and analyzed


The worst data breaches of 2014…so far (Q1)

The Identity Theft Resource Center, which tracks data breaches, has counted 204 of them through March of the this year for a loss of 4,238,983 records related to sensitive personal information exposed through hacker...

Businesses face rising political pressure from data breaches

FTC encourages Congress to pass national breach notification legislation, among other efforts.

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

Yahoo Logo

Yahoo! Encrypts! All! The! Things!

Yahoo has offered a public status update for their various encryption projects, including an announcement that a new, encrypted, version of Yahoo Messenger will be released in the coming months.

U.S. government seeking easier hacking sparks privacy debate

Government has made a request to change federal court rules to ease the ability to hack into computers during criminal investigations

Gameover malware targets accounts on employment websites

In addition to CareerBuilder, new variants of the Trojan program target Monster.com, researchers from F-Secure said

Blue bank vault

Banks' suit in Target breach a 'wake up call' for companies hiring PCI auditors

Two banks have filed a lawsuit against Target and Trustwave Holdings, the retailer's security assessor

Gartner Magic Quadrant for Client Management Tools

The client management tool market is maturing and evolving to adapt to consumerization, desktop virtualization, and an ongoing need to improve efficiency.

Report: Obama to unveil legislation to end NSA bulk phone data collection

Phone data will now be stored with telecommunications carriers rather than with the U.S. National Security Agency

Turkey, Twitter & Censorship: VPN, Tor and more

Well, it seems that even a blind squirrel can find a nut every now and again. It appears from reports that the Turkish government finally figured out how to remedy their laughable attempt to block Twitter by using DNS. The citizens...

California DMV customers may be affected by a credit card breach

The state's Department of Motor Vehicles is warning customers of a potential security breach affecting its payment processor.

NSA hacked into servers at Huawei headquarters, reports say

The US government agency also gained information to place backdoors on networking equipment, according to leaked documents

Audit Ready and Asset Optimized: The Solid Promise of an Intelligent Software Asset Management Solution

In this paper Frost & Sullivan examines the benefits of enterprise-grade Software Asset Management solutions, and how these solutions serve as the convergence point for other endpoint management and control functions.

Microsoft tweaks privacy policies after email spying backlash

To track down a Windows 8 leaker Microsoft peeked inside a blogger's email account

googleglass

Why Google Glass security remains a work in progress

University researchers develop spyware for Glass that snaps pictures and sends them to a remote server

Fake Tor app has been sitting in Apple's App Store for months, Tor Project says

Apple has not removed the fake app so far despite being notified in December, Tor developers say

5 ways to prevent data loss in mobile environments

Confidential company data can make its way onto mobile devices, where it's no longer under the protection of your toughest network defenses. Does that make your data vulnerable? To find out, review some strategies for preventing data...

Pragmatic Endpoint Management: Empowering an SMB Workforce in the Age of Mobility

Lacking the time for proper training and education, SMB administrators often resort to taking shortcuts to keep their environment running.This paper discusses the challenges of managing different endpoints in SMB-sized

Impact of EA Games hack on Apple shows ripple effect of attacks

EA Games server hacked to redirect users to phishing page requesting Apple ID and password

Healthcare.gov: Proceed at your own risk

The government insists the Obamacare site is secure. But most experts disagree

Hacker Diabl0 arrested in Thailand at the request of Swiss authorities

He is wanted in connection with computer fraud and credit card information theft in Switzerland

20 infamous hacker security vendor break-ins

Here are 20 of the most notorious known break-ins over the past decade.

Load More