Survey shows depth to which Internet users are ignoring core precautions, using weak passwords, and storing sensitive data in email.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing in identity, privacy and security issues. Currently, he is the Identity Evangelist for cloud identity security vendor Ping Identity, where he blogs about relevant issues related to digital identity.
Flaw in fingerprint reader software called "nothing but a big, glowing security hole." Vulnerability exposes all files, documents on PC.
Data collected by natural gas SmartMeters used by more than nine million customers in California is now protected under a set of historic privacy rules laid out in the state's Smart Grid initiative.
Nearly one in four BYOD mobile workers with smartphones and tablets are employing workarounds to bypass IT controls on corporate data.
Survey shows 68% of U.S. organizations will increase SaaS spending between now and 2015, while 80% in Asia/Pacific will increase spending slightly.
Identity's ultimate value to enterprise security lies in its ability to provide contextual aspects for date and resource protection, such as who is accessing what, from where, and with what kind of credential.
How is mobility changing the game for enterprise IT.
IT needs to address mobility as an architecture issue and consider a myriad of technology, infrastructure and policy decisions, so said Gartner during the opening of its annual Catalyst Conference.
The push is officially under way to create an identity layer for the Internet that promises to secure online transactions. It's a lofty goal with many challenges.
A group of graphic design students were curious, if they simply asked people to hand over their passwords would they do it. And "Trust Me, It's Art" was born.