An Illinois woman files a class action suit against LinkedIn claiming that violation of its own privacy policies and user agreements allowed hackers to steal 6.46 million passwords.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing on access control, identity, privacy and security issues. Currently, he is the Identity Evangelist for strong authentication vendor Yubico, where he writes and edits a blog, as well as, directs several social media channels and represents Yubico at the FIDO Alliance. Prior to Yubico, John spent five years with identity vendor Ping Identity. He also spent 15 years as a senior editor for a variety of publications, including Communications Week, Internet Week and Network World, where he focused on enterprise topics including collaboration, directories, network infrastructure, databases, open source, ERP and security. He covered IBM, Microsoft, Cisco, Oracle, Red Hat, Google among other enterprise vendors. His work has also appeared in the New York Times, CNN, CIO and Mashable.
Another password and data breach. Another mad scramble of questions and Band-Aids. It's not password configuration, policies or anything else, it's the infrastructure that needs an overhaul.
Developers are finding themselves back in the spotlight as the shifting computing landscape clamors for their skills. Recently, I stepped outside my ID world to attend the Glue Conference and see what's up.
A proposal to create a new standard for provisioning users to cloud services is making its way along the standards track and is soon to be the focus for a new IETF working group.
The software giant begins talking publicly about Windows Azure Active Directory service and plans to use it as the foundation for its Identity Management as a Service strategy.
APIs are quickly becoming the application glue for the Web with billions of calls per day making some companies billions of dollars per year, according to one keynote speaker at the annual Glue Conference.
A developer has created a password analysis tool that examines patterns to determine password strength and concludes password-creation policies are the real enemy of solid passwords.
A malicious attack aimed at Google but routed through Plaxo highlights the growing importance of API security using the forthcoming OAuth 2.0 protocol, which protects the user's credential information.
The major social networking sites have all been fined for improper use of private data; is that a trend that should be ringing alarm bells or a sideshow for the paranoid and uninitiated?
Phishers are actively trolling the Internet trying to trick users into giving up their OpenID-based log-in credentials to popular social networking sites.
A pair of entrepreneurs thinks labels on websites that outline information sharing rules could go a long way toward protecting user privacy on the Internet and improving business relationships between consumers and online services.
The proposed Social Networking Online Protection Act is designed to shield the social networking passwords of job applicants and students.
It will be at least a few weeks before the Electronic Privacy Information Center (EPIC) finds out if the FCC wants to provide an unedited copy of its report in the Google's Street View investigation.
Nearly 800,000 deceased Americans each year have their identity stolen by thieves looking for financial or other gain, according to a new study.
The Electronic Privacy Information Center wants to see the full, unedited report the Federal Communications Commission published on its investigation of Google and possible violations of wiretap laws.