Is there a perfect storm brewing with authentication or just more rain on the wearable parade?
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing on access control, identity, privacy and security issues. Currently, he is the Identity Evangelist for strong authentication vendor Yubico, where he writes and edits a blog, as well as, directs several social media channels and represents Yubico at the FIDO Alliance. Prior to Yubico, John spent five years with identity vendor Ping Identity. He also spent 15 years as a senior editor for a variety of publications, including Communications Week, Internet Week and Network World, where he focused on enterprise topics including collaboration, directories, network infrastructure, databases, open source, ERP and security. He covered IBM, Microsoft, Cisco, Oracle, Red Hat, Google among other enterprise vendors. His work has also appeared in the New York Times, CNN, CIO and Mashable.
Password hacks and new cracker tools surfaced this week to reinforce passwords are indeed sitting ducks. Will anything be done about it?
Postal Service spearheading program to create, test Federal Cloud Credential Exchange
Passwords could be exposed during memory dump.
Moto X, the first Google phone, shows one step along the search giant's authentication strategy
There's plenty of room under the blankets of poor security.
Micro-blogging site plans to continue to innovate around authentication use cases.
Insecure implementation of authentication protocol led to vulnerability in service used by 85% of Fortune 500
Mix of cloud, mobile, big data, social collaboration will be hallmark of future IT success, says Gartner analyst at Catalyst Conference
Essay provides insights from "father of Internet" on future of Web.
Patent application describes delivery of another identity factor just as cloud services make push for strong authentication.
Mobile, cloud convergence will remake IT architectures, organizations and foster new "meta OS"
Working group's goal would be to simplify application access controls for mobile devices
Surgical devices, ventilators, defibrillators, and monitors are among the equipment at risk.
Is turning humans into signal-emitting authentication devices possible or even desirable?