Smartphones and smart apps are major factors in access control strategies that plan to ignore whining from end-users
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing in identity, privacy and security issues. Currently, he is the Identity Evangelist for cloud identity security vendor Ping Identity, where he blogs about relevant issues related to digital identity.
Simple credentials are showing their risk to high-profile users of Twitter.
A suitable password replacement could disrupt or defeat 80% of these attacks, report concludes.
Hackers are slipping off with what they really came for — record numbers of password hashes and email addresses.
Users would need to enter a password before using a lens and camera combination.
Mozilla planing on its federated and distributed authentication idea to catch fire now that it has bridged a major gap.
Facebook Home officially launches Friday and privacy is (not surprisingly) the nagging question.
Two-factor authentication requirements will be accepted by websites and end users at least to aid sensitive transactions, an analyst has predicted.
NSTIC and the Office of Management and Budget hope secure ID credentials add security, accuracy, speed to state, local government benefit programs online.
SANS Institute's list of the top 7 human risks in computing includes phishing, passwords, and devices.