State taking specific steps to protect $2.9 trillion in assets across 1,900 financial institutions
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing on access control, identity, privacy and security issues. Currently, he is the Identity Evangelist for strong authentication vendor Yubico, where he writes and edits a blog, as well as, directs several social media channels and represents Yubico at the FIDO Alliance. Prior to Yubico, John spent five years with identity vendor Ping Identity. He also spent 15 years as a senior editor for a variety of publications, including Communications Week, Internet Week and Network World, where he focused on enterprise topics including collaboration, directories, network infrastructure, databases, open source, ERP and security. He covered IBM, Microsoft, Cisco, Oracle, Red Hat, Google among other enterprise vendors. His work has also appeared in the New York Times, CNN, CIO and Mashable.
The Target breach case has the potential to define who has to write the checks to pay for the cleanup following a major breach.
The malware variant also has its eye on online commerce, transaction authentication software
Union president says they were kept in dark, claims unfair labor practices in complaint to National Labor Relations Board.
Recent events highlight leaking data as threat to privacy, anonymity, security
A $15 million Postal Service access control program set to go live was separate from hacked network
Challenges ahead, but three major deployments have consortium feeling it is in right place at right time with right ideas
End-users will ultimately decide on the success of multi-factor authentication. Will the newest efforts toward that end help them make up their minds?
Kit lets app devs give end-users ability to use phone number for sign-up and log-in
The company is unveiling an option for developers to add extra strength and intelligence to the login process with policies, second-factor authentication and other techniques.
The international, cross-industry non-profit GlobalPlatform focuses on standardization, secure apps with Near-Field Communication and mobile as area of emphasis
Users are still clinging to hopes for the best without preparing for the worst, even with two-factor authentication and identity management advancements.
I changed jobs to get a front-row seat to see if end-users can lead a culture shift and bring on stronger, more secure authentication
Proposal focuses on balancing national security and end-user privacy.
Only 9 percent say they have a handle on the issue, according to SANS Institute survey.
The best of ZDNet, delivered
- 1 Researchers say WeMo devices flawed, suggest deactivating
- 2 Google unveils 5-year roadmap for strong authentication
- 3 Stolen passwords re-used to attack Best Buy accounts
- 4 AWS folds Facebook, Google credentials into new ID federation tools
- 5 Citadel malware attacking open source password managers