The World Wide Web Consortium opens a three-day meeting to define the parameters of its Web Tracking Protection specification. It is being closely watched by the digital advertising industry and privacy and consumer groups.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing in identity, privacy and security issues. Currently, he is the Identity Evangelist for cloud identity security vendor Ping Identity, where he blogs about relevant issues related to digital identity.
The Identity in the Cloud technical committee at OASIS is calling on the public to help it vet identity standards for a myriad of cloud use cases from mobile to digital signatures.
Google has tweaked its search engine to ensure that when users change their passwords they are signed out everywhere.
To recover from a data breach, companies are turning to a number of procedures and technologies including re-education, identity and access management, and expanded use of encryption, a Ponemon Institute study reveals.
Industry luminary Kim Cameron, now a distinguished engineer with Microsoft working on identity, wrote the Seven Laws of Identity in 2005. He discusses with ZDNet why these seven "scientific" laws are revealing their insight seven years later.
The FTC issues a privacy report that garners overall praise but criticism for its self-regulatory proposals.
In 2005, industry luminary Kim Cameron penned his Seven Laws of Identity, outlining a hypothesis on how identity and privacy work on the Internet. Today, everything is going as perceived seven years ago, and it's not all bad.
Industry luminary Kim Cameron, now a distinguished engineer with Microsoft working on identity, wrote the Seven Laws of Identity in 2005. He discusses with ZDNet why these seven hypotheses are revealing their insight seven years later.
Google is improving security for Web applications connecting to its server-based platforms by dropping keys and passwords and turning to certificates and an emerging protocol called OAuth 2.0.
Bugs discovered in Web-based single sign-on services and sites run by the likes of Facebook, Google, Twitter and PayPal can allow hackers to gain access to a user's account, researchers have discovered.