Nearly one in four BYOD mobile workers with smartphones and tablets are employing workarounds to bypass IT controls on corporate data.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing on access control, identity, privacy and security issues. Currently, he is the Identity Evangelist for strong authentication vendor Yubico, where he writes and edits a blog, as well as, directs several social media channels and represents Yubico at the FIDO Alliance. Prior to Yubico, John spent five years with identity vendor Ping Identity. He also spent 15 years as a senior editor for a variety of publications, including Communications Week, Internet Week and Network World, where he focused on enterprise topics including collaboration, directories, network infrastructure, databases, open source, ERP and security. He covered IBM, Microsoft, Cisco, Oracle, Red Hat, Google among other enterprise vendors. His work has also appeared in the New York Times, CNN, CIO and Mashable.
Survey shows 68% of U.S. organizations will increase SaaS spending between now and 2015, while 80% in Asia/Pacific will increase spending slightly.
Identity's ultimate value to enterprise security lies in its ability to provide contextual aspects for date and resource protection, such as who is accessing what, from where, and with what kind of credential.
How is mobility changing the game for enterprise IT.
IT needs to address mobility as an architecture issue and consider a myriad of technology, infrastructure and policy decisions, so said Gartner during the opening of its annual Catalyst Conference.
The push is officially under way to create an identity layer for the Internet that promises to secure online transactions. It's a lofty goal with many challenges.
A group of graphic design students were curious, if they simply asked people to hand over their passwords would they do it. And "Trust Me, It's Art" was born.
Is the "Epic Hack" the shot heard 'round the cloud?
Nearly 15 years after founding SuperGroups.com, Mark Weinstein is back with Sgrouples and says it’s time privacy becomes the hallmark of social networking.
LinkedIn executives reveal on quarterly earnings call just what the June theft of 6.5 million passwords cost the company in forensic work and on-going security updates.
After admitting that its service was breached, Dropbox says it will offer two-factor authentication. Is it the answer to the issue or the start of a new round of questions?
The Electronic Frontier Foundation is using an interactive Twitter tool that has opponents to the Cybersecurity Act of 2012 flooding the Twitter accounts of U.S. senators.
A privacy survey ranks the Top 100 data points in terms of what information end-users care the most about keeping private. Also, Baby Boomers emerge as most privacy-sensitive group.
OAuth 2.0 should be finalized this week, but the action is taking place in blogs and comment sections online as three years of work and frustration boil over.
Researchers are focusing on the feet to develop a new biometric system that proves identity and can help detect certain diseases.