"Simple stuff" not getting done, and poor password hygiene among top issues
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing on access control, identity, privacy and security issues. Currently, he is the Identity Evangelist for strong authentication vendor Yubico, where he writes and edits a blog, as well as, directs several social media channels and represents Yubico at the FIDO Alliance. Prior to Yubico, John spent five years with identity vendor Ping Identity. He also spent 15 years as a senior editor for a variety of publications, including Communications Week, Internet Week and Network World, where he focused on enterprise topics including collaboration, directories, network infrastructure, databases, open source, ERP and security. He covered IBM, Microsoft, Cisco, Oracle, Red Hat, Google among other enterprise vendors. His work has also appeared in the New York Times, CNN, CIO and Mashable.
New forms and strategies for authentication changing the definition of logging on
Password alternatives look to hit stride in 2014 and end-users are key to success.
Apple putting together quiver of biometric, gesture technology but is it shooting for real security or consumer convenience
Company says "irregular activity" prompted pro-active moves
Collaborative development site bans weak passwords, ups rate-limiting efforts
Gartner lays out a future for enterprise identity and how it will, or won't, look compared to today.
The pain isn't remembering passwords, it's having them stolen
AWS customers get single sign-on to Management Console, APIs
Digital exhaust left by NSA frames researcher's seven points on the future of identity
Apple not out of the authentication game, although new Apple device updates ignore Touch ID
Executive chairman dances around straight answer while talking up Android security.
Governments will start to come knocking in name of security
Sound-initiated data exchange similar to Near Field Communications but without proximity requirements
It's been a rough start for Touch ID and iOS7 security
The best of ZDNet, delivered
- 1 Researchers say WeMo devices flawed, suggest deactivating
- 2 Privacy vs. digital age: Where's the balance?
- 3 Hackers favor authentication-based attacks, report shows
- 4 Access control changes a must for future, safe Internet, Vint Cerf says
- 5 Tale of two breaches shows passwords not the real problem