Extra layer of security for access control is trend surfacing in enterprises, governments, cloud services
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing on access control, identity, privacy and security issues. Currently, he is the Identity Evangelist for strong authentication vendor Yubico, where he writes and edits a blog, as well as, directs several social media channels and represents Yubico at the FIDO Alliance. Prior to Yubico, John spent five years with identity vendor Ping Identity. He also spent 15 years as a senior editor for a variety of publications, including Communications Week, Internet Week and Network World, where he focused on enterprise topics including collaboration, directories, network infrastructure, databases, open source, ERP and security. He covered IBM, Microsoft, Cisco, Oracle, Red Hat, Google among other enterprise vendors. His work has also appeared in the New York Times, CNN, CIO and Mashable.
From EU to US, ever more frequent cries are going out for restoration of trust.
Yahoo building toward standards-based single sign-on environment that will reach across its services, Internet
Service provider says it's reverting to Yahoo-only access controls, won't accept Facebook, Google credentials any longer
Google, Microsoft, Salesforce, GSMA, UK, welcome final OpenID Connect spec in effort to scale ID services across cloud, mobile
German company puts faith in OpenID Connect to secure infrastructure, integrate SSO with partners
CEO pivots discussion to industry rallying cry, invokes memory of JFK
Keep close eye on government, don't trade civil liberties for greater security, Richard Clarke tells RSA audience
Vendor patches firmware, API server, smartphone apps
Hackers could remotely take over devices, power outlets in your home
Researchers say they have found another unique identifier
"Simple stuff" not getting done, and poor password hygiene among top issues
New forms and strategies for authentication changing the definition of logging on
Password alternatives look to hit stride in 2014 and end-users are key to success.
Apple putting together quiver of biometric, gesture technology but is it shooting for real security or consumer convenience