Hackers are slipping off with what they really came for — record numbers of password hashes and email addresses.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing in identity, privacy and security issues. Currently, he is the Identity Evangelist for cloud identity security vendor Ping Identity, where he blogs about relevant issues related to digital identity.
Users would need to enter a password before using a lens and camera combination.
Mozilla planing on its federated and distributed authentication idea to catch fire now that it has bridged a major gap.
Facebook Home officially launches Friday and privacy is (not surprisingly) the nagging question.
Two-factor authentication requirements will be accepted by websites and end users at least to aid sensitive transactions, an analyst has predicted.
NSTIC and the Office of Management and Budget hope secure ID credentials add security, accuracy, speed to state, local government benefit programs online.
SANS Institute's list of the top 7 human risks in computing includes phishing, passwords, and devices.
The Commonwealth may well be proving that a national effort to build an identity layer for the internet has the tools it needs to meet the challenge.
A pair of security experts laud the renewed interest in two-factor authentication, but say there are other improvements needed to tighten security around end-user logins.
The National Strategy for Trusted Identities in Cyberspace is moving ahead with current plans to establish more pilots and programs this year.