John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
A woman who argued that providing a password to authorities was a violation of her Fifth Amendment rights has filed an appeal in her case and is now also citing the Fourth Amendment.
A federal court has agreed to an accelerated briefing schedule in a privacy case that could affect the rollout of Google's new privacy policies.
The Electronic Privacy Information Center is suing the Federal Trade Commission in federal court to compel the agency to stop Google from rolling out its new privacy policies.
The government's National Strategy for Trusted Identities in Cyberspace takes its most important step to date by releasing recommendations for turning the effort over to the private sector.
The Mozilla Foundation is inviting all email providers to adopt its BrowserID technology and begin validating their users' log-ins to Web sites that support the protocol.
Six trends will dominate the identity landscape in 2012, according to Gartner. Three are new and three are holdovers from 2011. The trends challenge not only the way IT thinks about identity and how to manage it, but in the technologies and standards available to implement it.
The effort to create a national identity infrastructure is starting to take shape as $10 million is ear-marked to fund pilot programs that may well form the foundation of the National Strategy for Trusted Identities in Cyberspace (NSTIC).
The Electronic Privacy Information Center has filed a Freedom of Information request to see Google's mandated privacy report to the Federal Trade Commission, which is part of April settlement with the agency.
Facebook has drawn the attention from the IETF with a new proprietary extension it developed for an emerging authentication protocol. The extension alters the way user permissions are set for long-life access tokens.
The digital age is launching an assault on privacy as we've known it. As social sites collect more and more data how will attitudes toward privacy change. And what can be done from a self-regulation, legal and end-user stand point to put more control back into the hands of consumers.
The Mozilla Foundation is finally testing its BrowserID authentication system, but a missing part of the architecture used to validate a user's credentials is a big gap the Foundation must address.
A federal case that may have helped define constitutional law in the digital age turns not on the defendant's rights in regard to her encryption password, but on the fact that evidence clearly showed she owned a laptop in question and had access to its contents.
OAuth 2.0, a key framework for securing native mobile applications and APIs, Monday moved a step from being declared an official Internet Engineering Task Force standard. The authentication/authorization framework, which aids in cloud security, lays out an identity access token exchange in lieu of username and password.