Identity Management

Identity Management news, information, and how-to advice

neo urban laptop hardware computer
broken key

nordvpn

Get 72% off NordVPN Virtual Private Network Service For a Limited Time - Deal Alert

NordVPN has discounted their popular VPN software 72%. Use our link and see the discount applied when you click "buy now".

httpseverywhere

Three privacy tools that block your Internet provider from tracking you

The government may soon allow your ISP to sell your browsing data. Here's how to fight back.

FCC building in Washington

Senate votes to kill FCC's broadband privacy rules

The U.S. Senate has voted to kill broadband provider privacy regulations prohibiting them from selling customers' web-browsing histories and other data without permission.

facial recognition

US lawmakers question police use of facial recognition tech

U.S. lawmakers plan to introduce legislation to limit the FBI's and other law enforcement use of facial recognition technology after concerns about the mass collection of photographs in police databases.

watson dumb executives primary2

Report says smart people do dumb things online

People from the religious and legal fields were considered lazy for not following security standards.

james comey testify fbi intelligence

FBI looks into Russian hack of US election, possible Trump involvement

The FBI is actively investigating Russia's attempts to influence the 2016 U.S. presidential election and possible cooperation from President Donald Trump's campaign, agency director James Comey confirmed.

https encrypted

Some HTTPS inspection tools might weaken security

Companies that use security products to inspect HTTPS traffic might inadvertently make their users' encrypted connections less secure and expose them to man-in-the-middle attacks, the U.S. Computer Emergency Readiness Team warns.

us ethiopia justice

Court blocks American from suing Ethiopia for infecting his computer

An appeals court has barred an Ethiopian-born U.S citizen from filing a civil suit against the African country, which allegedly infected his computer with spyware and monitored his communications.

iphone locked

DOJ: No, we won't say how much the FBI paid to hack terrorist's iPhone

The Justice Department says it should not have to reveal the maker of a tool used last year to crack an alleged terrorist's iPhone or disclose how much it paid.

NSA headquarters

The NSA's foreign surveillance: 5 things to know

A contentious piece of U.S. law giving the National Security Agency broad authority to spy on people overseas expires at the end of the year.

confidential file folder

Report finds the security of confidential documents is a significant problem

60 percent of survey respondents say sensitive documents have accidentally been sent to the wrong person.

cloud security

Google tries to beat AWS at cloud security

New tools that protect enterprise applications running on Google Cloud Platform may help take the spotlight away from AWS and Microsoft Azure

us china russia

After WikiLeaks' CIA dump, China tells U.S. to stop spying

China today asked the U.S. government to stop spying on it, its first reaction to WikiLeaks' disclosure this week of a trove of CIA documents.

screen shot 2017 03 09 at 9.58.02 am

Assange: CIA had lost control of its cyberweapon documents

Information about purported CIA cyberattacks was "passed around" among members of the U.S. intelligence community and contractors before it was published by WikiLeaks this week, Julian Assange says.

capitol building clouds

US Senate resolution aims to roll back privacy rules for ISPs

A resolution introduced in the U.S. Senate on Tuesday aims to roll back privacy rules for broadband service providers that were approved by the Federal Communications Commission in October.

screen shot 2017 02 27 at 4.33.35 pm

US senator probes into CloudPets smart toy hack

A U.S. senator is probing reports of a breach of data from smart toys from Spiral Toys, writing to the company’s CEO a letter with ten questions about the issue, including about the company’s security practices.

home automation

Consumers are wary of smart homes that know too much

Nearly two-thirds of consumers are worried about home IoT devices listening in on their conversations, according to a Gartner survey released Monday.

head scratcher strategy thinking

3 ways to improve the security of identity and access management

A highly effective identity and access management program will always deliver business value. However, treating architecture and security as an afterthought can - and often does - result in massive data breaches that have significant...

Load More