Limited uses, no access for developers among limiting factors for enterprise security consideration.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing in identity, privacy and security issues. Currently, he is the Identity Evangelist for cloud identity security vendor Ping Identity, where he blogs about relevant issues related to digital identity.
Pew Research study also shows women more likely than men to use real name when posting online.
Is there a perfect storm brewing with authentication or just more rain on the wearable parade?
Password hacks and new cracker tools surfaced this week to reinforce passwords are indeed sitting ducks. Will anything be done about it?
Postal Service spearheading program to create, test Federal Cloud Credential Exchange
Passwords could be exposed during memory dump.
Moto X, the first Google phone, shows one step along the search giant's authentication strategy
There's plenty of room under the blankets of poor security.
Micro-blogging site plans to continue to innovate around authentication use cases.
Insecure implementation of authentication protocol led to vulnerability in service used by 85% of Fortune 500