Security News

People rely on usernames and passwords to identify themselves to machines so they can gain access to data and services. Machines also need to authenticate themselves to each other so they can...

Does Facebook continue to track the locations of its users even when they’ve told it not to? Yes!

Carolyn McCarthy gave an excellent TEDx talk about becoming a tech policy activist. It's a powerful call for public-interest technologists....

When it comes to managing drones (Unmanned Aircraft Systems, or UAS) the US Department of Justice wants Americans to know it’s on the case.

The DHS is requiring all federal agencies to develop a vulnerability disclosure policy. The goal is that people who discover vulnerabilities in government systems have a mechanism for reporting...

Automate Screening of Exposed Passwords and Password Policy EnforcementHere are four automated password policy options we recommend for NIST compliance.

NeuVector, the leader in Full Lifecycle Container Security, announced the immediate availability of the industry’s first “Security Policy as Code” capability for Kubernetes services. The release –...

Self-driving cars, remote-controlled thermostats, medical treatments, smart TVs and virtual assistants. The Internet of Things (IoT), this vast array of devices connected to the worldwide web, is...

Fugue, the company empowering engineers to build and operate secure cloud systems that are compliant with enterprise policies, announced it has open sourced the Fugue Rego Toolkit (Fregot) to...

Last month, I gave a 15-minute talk in London titled: "Why technologists need to get involved in public policy." In it, I try to make the case for public-interest technologists. (I also maintain a...