Patent application describes delivery of another identity factor just as cloud services make push for strong authentication.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing on access control, identity, privacy and security issues. Currently, he is the Identity Evangelist for strong authentication vendor Yubico, where he writes and edits a blog, as well as, directs several social media channels and represents Yubico at the FIDO Alliance. Prior to Yubico, John spent five years with identity vendor Ping Identity. He also spent 15 years as a senior editor for a variety of publications, including Communications Week, Internet Week and Network World, where he focused on enterprise topics including collaboration, directories, network infrastructure, databases, open source, ERP and security. He covered IBM, Microsoft, Cisco, Oracle, Red Hat, Google among other enterprise vendors. His work has also appeared in the New York Times, CNN, CIO and Mashable.
Mobile, cloud convergence will remake IT architectures, organizations and foster new "meta OS"
Working group's goal would be to simplify application access controls for mobile devices
Surgical devices, ventilators, defibrillators, and monitors are among the equipment at risk.
Is turning humans into signal-emitting authentication devices possible or even desirable?
Amazon Web Services aims at mobile apps with new dev tools to support third-party ID credentials
Noted developer Tim Bray says the Internet is headed for a brick wall and implores his peers to get on board with emerging identity protocols for securing applications, APIs.
Developers key to operating cloud native applications, says architecture director of company's cloud systems team.
Enterprise interest and investments ready to jump over the next two years, Gartner says
Smartphones and smart apps are major factors in access control strategies that plan to ignore whining from end-users
Simple credentials are showing their risk to high-profile users of Twitter.
A suitable password replacement could disrupt or defeat 80% of these attacks, report concludes.
Hackers are slipping off with what they really came for — record numbers of password hashes and email addresses.
Users would need to enter a password before using a lens and camera combination.
Mozilla planing on its federated and distributed authentication idea to catch fire now that it has bridged a major gap.
The best of ZDNet, delivered
- 1 Researchers say WeMo devices flawed, suggest deactivating
- 2 Citadel malware attacking open source password managers
- 3 Google unveils 5-year roadmap for strong authentication
- 4 Apple sets teamwork tone with leaders role in NFC, infrastructure group
- 5 Salesforce Winter 15 adding strength to authentication services