Moto X, the first Google phone, shows one step along the search giant's authentication strategy
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing in identity, privacy and security issues. Currently, he is the Identity Evangelist for cloud identity security vendor Ping Identity, where he blogs about relevant issues related to digital identity.
There's plenty of room under the blankets of poor security.
Micro-blogging site plans to continue to innovate around authentication use cases.
Insecure implementation of authentication protocol led to vulnerability in service used by 85% of Fortune 500
Mix of cloud, mobile, big data, social collaboration will be hallmark of future IT success, says Gartner analyst at Catalyst Conference
Essay provides insights from "father of Internet" on future of Web.
Patent application describes delivery of another identity factor just as cloud services make push for strong authentication.
Mobile, cloud convergence will remake IT architectures, organizations and foster new "meta OS"
Working group's goal would be to simplify application access controls for mobile devices
Surgical devices, ventilators, defibrillators, and monitors are among the equipment at risk.