Is two-factor the savior for secure logins?
A pair of security experts laud the renewed interest in two-factor authentication, but say there are other improvements needed to tighten security around end-user logins.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing in identity, privacy and security issues. Currently, he is the Identity Evangelist for cloud identity security vendor Ping Identity, where he blogs about relevant issues related to digital identity.
A pair of security experts laud the renewed interest in two-factor authentication, but say there are other improvements needed to tighten security around end-user logins.
The National Strategy for Trusted Identities in Cyberspace is moving ahead with current plans to establish more pilots and programs this year.
A US District Court judge in California has ruled that plaintiffs failed to show harm stemming from last year's theft of 6.5 million passwords from LinkedIn.
Authentication, trust, and the cloud emerge as pressing issues for identity's evolution, according to the RSA Conference panel.
Security architectures will gain smarts by analyzing zettabytes of data.
Data breaches top the list, up from No. 5 just two years ago, in Cloud Security Alliance report.
Do end-users, online services, email providers and other invested parties have a collective conscience that can build a better credential and make the Web a safer place?
The RSA Conference will kick off next week with the Cloud Security Alliance Summit, which examines issues from identity, to mobile to national security.
The black hats are getting more sophisticated, but unfortunately the white hats are making the same old rookie mistakes
FIDO Alliance aligns smart devices, authentication but will its scope be broad enough and its appeal wide enough.