Noted developer Tim Bray says the Internet is headed for a brick wall and implores his peers to get on board with emerging identity protocols for securing applications, APIs.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing on access control, identity, privacy and security issues. Currently, he is the Identity Evangelist for strong authentication vendor Yubico, where he writes and edits a blog, as well as, directs several social media channels and represents Yubico at the FIDO Alliance. Prior to Yubico, John spent five years with identity vendor Ping Identity. He also spent 15 years as a senior editor for a variety of publications, including Communications Week, Internet Week and Network World, where he focused on enterprise topics including collaboration, directories, network infrastructure, databases, open source, ERP and security. He covered IBM, Microsoft, Cisco, Oracle, Red Hat, Google among other enterprise vendors. His work has also appeared in the New York Times, CNN, CIO and Mashable.
Developers key to operating cloud native applications, says architecture director of company's cloud systems team.
Enterprise interest and investments ready to jump over the next two years, Gartner says
Smartphones and smart apps are major factors in access control strategies that plan to ignore whining from end-users
Simple credentials are showing their risk to high-profile users of Twitter.
A suitable password replacement could disrupt or defeat 80% of these attacks, report concludes.
Hackers are slipping off with what they really came for — record numbers of password hashes and email addresses.
Users would need to enter a password before using a lens and camera combination.
Mozilla planing on its federated and distributed authentication idea to catch fire now that it has bridged a major gap.
Facebook Home officially launches Friday and privacy is (not surprisingly) the nagging question.
Two-factor authentication requirements will be accepted by websites and end users at least to aid sensitive transactions, an analyst has predicted.
NSTIC and the Office of Management and Budget hope secure ID credentials add security, accuracy, speed to state, local government benefit programs online.
SANS Institute's list of the top 7 human risks in computing includes phishing, passwords, and devices.
The Commonwealth may well be proving that a national effort to build an identity layer for the internet has the tools it needs to meet the challenge.
A pair of security experts laud the renewed interest in two-factor authentication, but say there are other improvements needed to tighten security around end-user logins.