If history and initial reaction are any gauge, privacy advancements will have to come from somewhere besides the Oval Office or Congress
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing on access control, identity, privacy and security issues. Currently, he is the Identity Evangelist for strong authentication vendor Yubico, where he writes and edits a blog, as well as, directs several social media channels and represents Yubico at the FIDO Alliance. Prior to Yubico, John spent five years with identity vendor Ping Identity. He also spent 15 years as a senior editor for a variety of publications, including Communications Week, Internet Week and Network World, where he focused on enterprise topics including collaboration, directories, network infrastructure, databases, open source, ERP and security. He covered IBM, Microsoft, Cisco, Oracle, Red Hat, Google among other enterprise vendors. His work has also appeared in the New York Times, CNN, CIO and Mashable.
Administration's ongoing cybersecurity efforts will get revision next week, but what is still missing are details and progress
Innovation will confine passwords within a broader equation around authentication type plus value of resource
A 21 percent jump in fraud helps convince European Banking Authority to issue revised final set of directives planned for 2015 implementation.
The Sony take-down didn't provide many new lessons for IT, but did emphasize the fact that even those with plenty to lose still have a blind eye
State taking specific steps to protect $2.9 trillion in assets across 1,900 financial institutions
The Target breach case has the potential to define who has to write the checks to pay for the cleanup following a major breach.
The malware variant also has its eye on online commerce, transaction authentication software
Union president says they were kept in dark, claims unfair labor practices in complaint to National Labor Relations Board.
Recent events highlight leaking data as threat to privacy, anonymity, security
A $15 million Postal Service access control program set to go live was separate from hacked network
Challenges ahead, but three major deployments have consortium feeling it is in right place at right time with right ideas
End-users will ultimately decide on the success of multi-factor authentication. Will the newest efforts toward that end help them make up their minds?
Kit lets app devs give end-users ability to use phone number for sign-up and log-in
The company is unveiling an option for developers to add extra strength and intelligence to the login process with policies, second-factor authentication and other techniques.