The nearly two-year-old NSTIC effort is ready to commit more funding to building an online identity system to stimulate and secure online interaction and transactions.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing in identity, privacy and security issues. Currently, he is the Identity Evangelist for cloud identity security vendor Ping Identity, where he blogs about relevant issues related to digital identity.
A Texas school puts RFID-enabled ID cards around students' necks, adding a religious twist to an on-going identity and privacy debate.
U.S. Department of Transportation proposes mandate for black boxes in all vehicles by Sept. 1, 2014.
Gartner is incubating a concept called People Centric Security that loosens controls and relies on end-users to assume responsibilities for protecting IT systems and data.
At its annual Identity and Access Management conference, Gartner says computing trends are fueling enterprise interest in ID.
Router maker adds the controversial technology to its line of hardware for home and small business.
The future of human-computer interaction was the theme at the Blur conference's jaw-dropping demo day.
Thought-controlled computing hits a milestone next summer and InteraXon CEO Ariel Garten is pushing the envelop - with her mind.
The Wired senior reporter is taking up the case against passwords - and with good reason.
Existing IT identity management systems don't provide the fuel to run cloud's motor for privacy, security