The FTC issues a privacy report that garners overall praise but criticism for its self-regulatory proposals.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing on access control, identity, privacy and security issues. Currently, he is the Identity Evangelist for strong authentication vendor Yubico, where he writes and edits a blog, as well as, directs several social media channels and represents Yubico at the FIDO Alliance. Prior to Yubico, John spent five years with identity vendor Ping Identity. He also spent 15 years as a senior editor for a variety of publications, including Communications Week, Internet Week and Network World, where he focused on enterprise topics including collaboration, directories, network infrastructure, databases, open source, ERP and security. He covered IBM, Microsoft, Cisco, Oracle, Red Hat, Google among other enterprise vendors. His work has also appeared in the New York Times, CNN, CIO and Mashable.
In 2005, industry luminary Kim Cameron penned his Seven Laws of Identity, outlining a hypothesis on how identity and privacy work on the Internet. Today, everything is going as perceived seven years ago, and it's not all bad.
Industry luminary Kim Cameron, now a distinguished engineer with Microsoft working on identity, wrote the Seven Laws of Identity in 2005. He discusses with ZDNet why these seven hypotheses are revealing their insight seven years later.
Google is improving security for Web applications connecting to its server-based platforms by dropping keys and passwords and turning to certificates and an emerging protocol called OAuth 2.0.
Bugs discovered in Web-based single sign-on services and sites run by the likes of Facebook, Google, Twitter and PayPal can allow hackers to gain access to a user's account, researchers have discovered.
The government is looking for an organization to lead the establishment and oversights of a group that will be key to the success of the National Strategy for Trusted Identities in Cyberspace.
Identity on the Internet is in need of an overhaul. Are forces coming together to start the revolution or are traditional foils such as trust still too much to overcome?
I've been thinking about the absurdity of employers demanding Facebook log-in credentials during job interviews, and how it might look flipped on its head. You know, we all have interests to protect.
Aerospace giant Boeing is piloting standards-based access controls built on the Extensible Access Control Markup language in order to dial-in authorization capabilities and help protect its intellectual property.
The Electronic Privacy Information Center and the Federal Trade Commission are gong toe-to-toe in court just a few days before Google rolls out its new privacy policies.
Clouds, mobile devices and distributed applications are smashing traditional enterprise security boundaries and identity is poised to help redefine a new security perimeter.
A federal appeals court has ruled that a suspect in a child pornography case is protected under the Fifth Amendment from disclosing a password that would decrypt his computer files.
A federal court Friday ruled that it does not have jurisdiction to intervene in the Federal Trade Commission's enforcement decisions in regards to a consent order in place with Google.
President Obama Thursday unveiled a model for a "Consumer Privacy Bill of Rights" that includes input from companies, privacy advocates, international partners and other stakeholders.
The best of ZDNet, delivered
- 1 Researchers say WeMo devices flawed, suggest deactivating
- 2 Apple's Touch ID doesn't match enterprise security's fingerprint
- 3 Postal Workers Union files complaint against USPS in wake of hack
- 4 FIDO boss sees group settling into authentication stride
- 5 Hackers favor authentication-based attacks, report shows