Developers key to operating cloud native applications, says architecture director of company's cloud systems team.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing in identity, privacy and security issues. Currently, he is the Identity Evangelist for cloud identity security vendor Ping Identity, where he blogs about relevant issues related to digital identity. Prior to Ping, John spent 15 years as a senior reporter for a variety of publications, including Communications Week, Internet Week and Network World, where he focused on enterprise topics including collaboration, directories, network infrastructure, databases, open source, ERP and security. He covered IBM, Microsoft, Cisco, Oracle, Red Hat, Google among other enterprise vendors. His work has also appeared in the New York Times, CNN, CIO and Mashable.
Enterprise interest and investments ready to jump over the next two years, Gartner says
Smartphones and smart apps are major factors in access control strategies that plan to ignore whining from end-users
Simple credentials are showing their risk to high-profile users of Twitter.
A suitable password replacement could disrupt or defeat 80% of these attacks, report concludes.
Hackers are slipping off with what they really came for — record numbers of password hashes and email addresses.
Users would need to enter a password before using a lens and camera combination.
Mozilla planing on its federated and distributed authentication idea to catch fire now that it has bridged a major gap.
Facebook Home officially launches Friday and privacy is (not surprisingly) the nagging question.
Two-factor authentication requirements will be accepted by websites and end users at least to aid sensitive transactions, an analyst has predicted.
NSTIC and the Office of Management and Budget hope secure ID credentials add security, accuracy, speed to state, local government benefit programs online.
SANS Institute's list of the top 7 human risks in computing includes phishing, passwords, and devices.
The Commonwealth may well be proving that a national effort to build an identity layer for the internet has the tools it needs to meet the challenge.
A pair of security experts laud the renewed interest in two-factor authentication, but say there are other improvements needed to tighten security around end-user logins.
The National Strategy for Trusted Identities in Cyberspace is moving ahead with current plans to establish more pilots and programs this year.