Skip to main content
Vol. I · No. 1

The Identity at the Core

The Definitive Chronicle of Identity & Access Management

Breach: BREACH: Major healthcare provider confirms 2.3M patient records exposed via misconfigured SCIM endpointVulnerability: CVE-2026-31847: Critical RCE in FortiAuthenticator — CVSS 9.8 — Patch immediatelyBreach: BREACH: European fintech platform leaks OAuth tokens affecting 890K usersAdvisory: ADVISORY: CISA warns of active exploitation of SAML implementation flaws in enterprise SSO productsBreach: BREACH: Major healthcare provider confirms 2.3M patient records exposed via misconfigured SCIM endpointVulnerability: CVE-2026-31847: Critical RCE in FortiAuthenticator — CVSS 9.8 — Patch immediatelyBreach: BREACH: European fintech platform leaks OAuth tokens affecting 890K usersAdvisory: ADVISORY: CISA warns of active exploitation of SAML implementation flaws in enterprise SSO products

BREACH: Major healthcare provider confirms 2.3M patient records exposed via misconfigured SCIM endpoint

CVE-2026-31847: Critical RCE in FortiAuthenticator — CVSS 9.8 — Patch immediately

BREACH: European fintech platform leaks OAuth tokens affecting 890K users

Legal

Privacy Policy

Last updated: May 5, 2026

Identity at the Core ("we", "us", or "the Publication") takes your privacy seriously. This Privacy Policy explains what personal information we collect, how we use it, and the rights you have over your data. We follow the principles of the EU General Data Protection Regulation (GDPR), Canada's Personal Information Protection and Electronic Documents Act (PIPEDA), and the California Consumer Privacy Act (CCPA).

1. Who We Are

Identity at the Core is an independent publication covering Identity and Access Management (IAM) news, breach intelligence, and expert commentary. The site is operated by Paulo Valadares (about the author).

2. Information We Collect

Information you provide directly

Information collected automatically

3. How We Use Your Information

We do not sell your personal information. We do not use it for advertising or share it with advertisers.

4. Legal Bases for Processing (GDPR)

We process personal data under the following legal bases: your consent (newsletter, optional profile fields), performance of a contract (account services), legitimate interests (security, fraud prevention), and legal obligation (compliance with applicable law).

5. Data Retention

6. Sharing With Third Parties

We share data only with vendors who help us operate the service, under contracts that bind them to confidentiality and data-protection standards equivalent to ours:

7. International Data Transfers

Our infrastructure is based in North America. If you access the site from outside this region, your information will be transferred to and processed in jurisdictions whose data-protection laws may differ from your own. We rely on Standard Contractual Clauses where applicable.

8. Your Rights

You have the right to:

To exercise any of these rights, email privacy@identityatcore.org. We will respond within 30 days.

9. Security

We protect your data with measures including: TLS 1.3 in transit, encryption at rest, Argon2id password hashing, role-based access control, per-endpoint rate limiting, audit logging of every significant action, and a strict Content Security Policy. No system is perfectly secure, but we work continuously to reduce risk.

10. Children

This service is not intended for individuals under the age of 16. We do not knowingly collect personal information from children. If you believe we have, please contact us and we will delete it.

11. Changes to This Policy

We may update this Privacy Policy from time to time. Material changes will be announced via the newsletter and a banner on this page. The "Last updated" date at the top of this page reflects the most recent revision.

12. Contact

Questions about this policy or our data practices? Email privacy@identityatcore.org.

site:privacy | Identity at the Core