Surgical devices, ventilators, defibrillators, and monitors are among the equipment at risk.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing in identity, privacy and security issues. Currently, he is the Identity Evangelist for cloud identity security vendor Ping Identity, where he blogs about relevant issues related to digital identity.
Is turning humans into signal-emitting authentication devices possible or even desirable?
Amazon Web Services aims at mobile apps with new dev tools to support third-party ID credentials
Noted developer Tim Bray says the Internet is headed for a brick wall and implores his peers to get on board with emerging identity protocols for securing applications, APIs.
Developers key to operating cloud native applications, says architecture director of company's cloud systems team.
Enterprise interest and investments ready to jump over the next two years, Gartner says
Smartphones and smart apps are major factors in access control strategies that plan to ignore whining from end-users
Simple credentials are showing their risk to high-profile users of Twitter.
A suitable password replacement could disrupt or defeat 80% of these attacks, report concludes.
Hackers are slipping off with what they really came for — record numbers of password hashes and email addresses.