The fact that Congress is considering an abstract concept to specify explicitly "identity" may open the door for private firms to do the same. But how could such a system identify people while maintaining privacy?
Should the public's right to data be defined before the law starts interpreting "public data" as something to which everyone has a right?
The distribution sources for potentially malicious documents are actively working to disable their distribution. But a Dropbox security alert seems to indicate that's making customers mad.
Reviving a sales model that goes back to the 1980s, the reseller becomes the customer's point-of-presence for Google's SMB applications.
How can the largest producer of collaboration appliances make collaboration work where appliances typically don't? Cisco engineers are tackling the problem before they're tackled by it.
The most eye-opening survey numbers from Ponemon to date imply that no one--absolutely no one--is actually implementing security governance standards as specified.
Last Monday in Spotlight, I pointed you toward an article from the personal blog of security researcher Jonathan Zdziarski, who reported on the existence of several exploitable back doors around security features in Apple's iOS.
Security firm Sucuri is warning WordPress admins that a "massive" malware infection is wreaking havoc on WordPress websites. Sites with outdated plugins or weak passwords are particularly at risk.
Among the many things Apple is notorious about not telling people is the architecture of its iOS system services. While on the surface you'd think Apple is operating in the best interests of security, what this means is that an active open source movement has germinated with the explicit goal of ferreting out ways to establish rootkits and other exploitative, stealth services on iPhones and iPads.
The system Ping Identity has been building (and to some extent, acquiring) to let people log onto services with their mobile phones is now ready for public launch.