Distributed cloud services and mobile-device clients are driving Web-friendly protocols for identity and security.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing in identity, privacy and security issues. Currently, he is the Identity Evangelist for cloud identity security vendor Ping Identity, where he blogs about relevant issues related to digital identity.
End-user generated passwords continue to have little defense against hackers, according to Deloitte Canada.
Forrester analyst Eve Maler says passwords will be an authentication method for the foreseeable future, but changes in IT attitudes can make that palatable.
The nearly two-year-old NSTIC effort is ready to commit more funding to building an online identity system to stimulate and secure online interaction and transactions.
A Texas school puts RFID-enabled ID cards around students' necks, adding a religious twist to an on-going identity and privacy debate.
U.S. Department of Transportation proposes mandate for black boxes in all vehicles by Sept. 1, 2014.
Gartner is incubating a concept called People Centric Security that loosens controls and relies on end-users to assume responsibilities for protecting IT systems and data.
At its annual Identity and Access Management conference, Gartner says computing trends are fueling enterprise interest in ID.
Router maker adds the controversial technology to its line of hardware for home and small business.
The future of human-computer interaction was the theme at the Blur conference's jaw-dropping demo day.