Insecure implementation of authentication protocol led to vulnerability in service used by 85% of Fortune 500
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing in identity, privacy and security issues. Currently, he is the Identity Evangelist for cloud identity security vendor Ping Identity, where he blogs about relevant issues related to digital identity.
Mix of cloud, mobile, big data, social collaboration will be hallmark of future IT success, says Gartner analyst at Catalyst Conference
Essay provides insights from "father of Internet" on future of Web.
Patent application describes delivery of another identity factor just as cloud services make push for strong authentication.
Mobile, cloud convergence will remake IT architectures, organizations and foster new "meta OS"
Working group's goal would be to simplify application access controls for mobile devices
Surgical devices, ventilators, defibrillators, and monitors are among the equipment at risk.
Is turning humans into signal-emitting authentication devices possible or even desirable?
Amazon Web Services aims at mobile apps with new dev tools to support third-party ID credentials
Noted developer Tim Bray says the Internet is headed for a brick wall and implores his peers to get on board with emerging identity protocols for securing applications, APIs.