I changed jobs to get a front-row seat to see if end-users can lead a culture shift and bring on stronger, more secure authentication
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing on access control, identity, privacy and security issues. Currently, he is the Identity Evangelist for strong authentication vendor Yubico, where he writes and edits a blog, as well as, directs several social media channels and represents Yubico at the FIDO Alliance. Prior to Yubico, John spent five years with identity vendor Ping Identity. He also spent 15 years as a senior editor for a variety of publications, including Communications Week, Internet Week and Network World, where he focused on enterprise topics including collaboration, directories, network infrastructure, databases, open source, ERP and security. He covered IBM, Microsoft, Cisco, Oracle, Red Hat, Google among other enterprise vendors. His work has also appeared in the New York Times, CNN, CIO and Mashable.
Proposal focuses on balancing national security and end-user privacy.
Only 9 percent say they have a handle on the issue, according to SANS Institute survey.
Authentication tools are emerging to minimize hack exposure, but can they kill end-user apathy?
What could it eventually mean to pass time with the social networking site?
Password hashes, email address stolen from third-party forum site less than week after DDoS attack
Is the new Touch ID edition going back to its roots and prepping for a much bigger authentication goal beyond Apple's walled garden?
Password breaches torture end-users more so than the hacked company, merchant or service.
Digital wallet app pulled from Apple, Amazon and Google stores
Glue Conference sketching out future built on DevOps, identity, mobile, APIs, subscription models, and evolving corporate strategies
What started out as hunting bug bounties eventually turned into Internet scare
Known issue is mitigated in OAuth, OpenID specs; implementation problems are at issue
New log-in options designed to provide anonymity, privacy
Accessed information included email addresses, encrypted passwords and security questions
Writing's on the wall for single-factor, password-based authentication on the Internet, Verizon report says.