Clouds, mobile devices and distributed applications are smashing traditional enterprise security boundaries and identity is poised to help redefine a new security perimeter.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing in identity, privacy and security issues. Currently, he is the Identity Evangelist for cloud identity security vendor Ping Identity, where he blogs about relevant issues related to digital identity.
A federal appeals court has ruled that a suspect in a child pornography case is protected under the Fifth Amendment from disclosing a password that would decrypt his computer files.
A federal court Friday ruled that it does not have jurisdiction to intervene in the Federal Trade Commission's enforcement decisions in regards to a consent order in place with Google.
President Obama Thursday unveiled a model for a "Consumer Privacy Bill of Rights" that includes input from companies, privacy advocates, international partners and other stakeholders.
A federal court denies a woman's appeal in a case where she said turning over her password to decrypt files was a violation of her Fifth Amendment rights.
A privacy group replies to the Federal Trade Commission's request to dismiss a lawsuit seeking a court ruling to compel the federal agency to enforce a consent order levied against Google as part of a privacy case settlement.
A woman who argued that providing a password to authorities was a violation of her Fifth Amendment rights has filed an appeal in her case and is now also citing the Fourth Amendment.