Entrepreneur sees robust cloud industry growing from Canadian government's forthcoming digital economy strategy.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing on access control, identity, privacy and security issues. Currently, he is the Identity Evangelist for strong authentication vendor Yubico, where he writes and edits a blog, as well as, directs several social media channels and represents Yubico at the FIDO Alliance. Prior to Yubico, John spent five years with identity vendor Ping Identity. He also spent 15 years as a senior editor for a variety of publications, including Communications Week, Internet Week and Network World, where he focused on enterprise topics including collaboration, directories, network infrastructure, databases, open source, ERP and security. He covered IBM, Microsoft, Cisco, Oracle, Red Hat, Google among other enterprise vendors. His work has also appeared in the New York Times, CNN, CIO and Mashable.
Prestigious engineering, science organization says it is working to inform those affected.
Stupid mistake: public access to logs, and more troublesome, keeping passwords in plain text, says teaching assistant who found data on IEEE FTP server.
Five organizations begin first efforts to turn identity initiative into reality.
Real-time audio snippets prove NFC-based devices are near each other to cut risk of "mafia fraud" relay attacks.
Twitter wanted no part of a fight with the New York State Supreme Court.
Massachusetts Rep. Ed Markey's proposed Mobile Device Privacy Act is aimed at protecting device users.
Klout is quietly piloting with developers its new OAuth API and KloutPass authentication verification as first steps in a larger strategy to become a platform and offer its data through other apps.
New York judge says produce data by Friday or face fines and contempt of court charges.
Survey shows depth to which Internet users are ignoring core precautions, using weak passwords, and storing sensitive data in email.
Flaw in fingerprint reader software called "nothing but a big, glowing security hole." Vulnerability exposes all files, documents on PC.
Data collected by natural gas SmartMeters used by more than nine million customers in California is now protected under a set of historic privacy rules laid out in the state's Smart Grid initiative.
Nearly one in four BYOD mobile workers with smartphones and tablets are employing workarounds to bypass IT controls on corporate data.
Survey shows 68% of U.S. organizations will increase SaaS spending between now and 2015, while 80% in Asia/Pacific will increase spending slightly.
Identity's ultimate value to enterprise security lies in its ability to provide contextual aspects for date and resource protection, such as who is accessing what, from where, and with what kind of credential.
The best of ZDNet, delivered
- 1 Researchers say WeMo devices flawed, suggest deactivating
- 2 Apple's Touch ID doesn't match enterprise security's fingerprint
- 3 Postal Workers Union files complaint against USPS in wake of hack
- 4 FIDO boss sees group settling into authentication stride
- 5 Hackers favor authentication-based attacks, report shows