Security architectures will gain smarts by analyzing zettabytes of data.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing in identity, privacy and security issues. Currently, he is the Identity Evangelist for cloud identity security vendor Ping Identity, where he blogs about relevant issues related to digital identity.
Data breaches top the list, up from No. 5 just two years ago, in Cloud Security Alliance report.
Do end-users, online services, email providers and other invested parties have a collective conscience that can build a better credential and make the Web a safer place?
The RSA Conference will kick off next week with the Cloud Security Alliance Summit, which examines issues from identity, to mobile to national security.
The black hats are getting more sophisticated, but unfortunately the white hats are making the same old rookie mistakes
FIDO Alliance aligns smart devices, authentication but will its scope be broad enough and its appeal wide enough.
Use of social network identities is expected to sky-rocket in the next two years, but it's aimed at reducing friction between merchants and your money, not because it's a better credential.
Google isn't just beginning to attack the password, in fact, it has been working since before 2010 on eliminating passwords and standardizing authentication on the Web.
Distributed cloud services and mobile-device clients are driving Web-friendly protocols for identity and security.
End-user generated passwords continue to have little defense against hackers, according to Deloitte Canada.