Use of social network identities is expected to sky-rocket in the next two years, but it's aimed at reducing friction between merchants and your money, not because it's a better credential.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing on access control, identity, privacy and security issues. Currently, he is the Identity Evangelist for strong authentication vendor Yubico, where he writes and edits a blog, as well as, directs several social media channels and represents Yubico at the FIDO Alliance. Prior to Yubico, John spent five years with identity vendor Ping Identity. He also spent 15 years as a senior editor for a variety of publications, including Communications Week, Internet Week and Network World, where he focused on enterprise topics including collaboration, directories, network infrastructure, databases, open source, ERP and security. He covered IBM, Microsoft, Cisco, Oracle, Red Hat, Google among other enterprise vendors. His work has also appeared in the New York Times, CNN, CIO and Mashable.
Google isn't just beginning to attack the password, in fact, it has been working since before 2010 on eliminating passwords and standardizing authentication on the Web.
Distributed cloud services and mobile-device clients are driving Web-friendly protocols for identity and security.
End-user generated passwords continue to have little defense against hackers, according to Deloitte Canada.
Forrester analyst Eve Maler says passwords will be an authentication method for the foreseeable future, but changes in IT attitudes can make that palatable.
The nearly two-year-old NSTIC effort is ready to commit more funding to building an online identity system to stimulate and secure online interaction and transactions.
A Texas school puts RFID-enabled ID cards around students' necks, adding a religious twist to an on-going identity and privacy debate.
U.S. Department of Transportation proposes mandate for black boxes in all vehicles by Sept. 1, 2014.
Gartner is incubating a concept called People Centric Security that loosens controls and relies on end-users to assume responsibilities for protecting IT systems and data.
At its annual Identity and Access Management conference, Gartner says computing trends are fueling enterprise interest in ID.
Router maker adds the controversial technology to its line of hardware for home and small business.
The future of human-computer interaction was the theme at the Blur conference's jaw-dropping demo day.
Thought-controlled computing hits a milestone next summer and InteraXon CEO Ariel Garten is pushing the envelop - with her mind.
The Wired senior reporter is taking up the case against passwords - and with good reason.
Existing IT identity management systems don't provide the fuel to run cloud's motor for privacy, security
The best of ZDNet, delivered
- 1 Researchers say WeMo devices flawed, suggest deactivating
- 2 Citadel malware attacking open source password managers
- 3 Google unveils 5-year roadmap for strong authentication
- 4 Salesforce Winter 15 adding strength to authentication services
- 5 Apple sets teamwork tone with leaders role in NFC, infrastructure group