What can small businesses do to improve online policies and procedures?
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing on access control, identity, privacy and security issues. Currently, he is the Identity Evangelist for strong authentication vendor Yubico, where he writes and edits a blog, as well as, directs several social media channels and represents Yubico at the FIDO Alliance. Prior to Yubico, John spent five years with identity vendor Ping Identity. He also spent 15 years as a senior editor for a variety of publications, including Communications Week, Internet Week and Network World, where he focused on enterprise topics including collaboration, directories, network infrastructure, databases, open source, ERP and security. He covered IBM, Microsoft, Cisco, Oracle, Red Hat, Google among other enterprise vendors. His work has also appeared in the New York Times, CNN, CIO and Mashable.
Small businesses often kidding themselves on cybersecurity, survey reveals.
OAuth 2.0 is officially blessed, now it's on to fulfilling the promise of securing access to, and integration among, applications.
Researchers say hackers could easily spread their attack after gaining Windows passwords.
The privacy debate around biometrics is nothing new, but it is starting to show up more and more in schools and involve kids as young as five years old.
The UK is reaching significant milestones in its plan to build an identity infrastructure for a digital government that connects citizens and online services
An open source project focused on OpenID Authentication for the .Net Framework has a flaw that could allow a hacker to take control of user accounts.
Persona is an open authentication system that uses email providers to validate that a user is who they say they are.
Entrepreneur sees robust cloud industry growing from Canadian government's forthcoming digital economy strategy.
Prestigious engineering, science organization says it is working to inform those affected.
Stupid mistake: public access to logs, and more troublesome, keeping passwords in plain text, says teaching assistant who found data on IEEE FTP server.
Five organizations begin first efforts to turn identity initiative into reality.
Real-time audio snippets prove NFC-based devices are near each other to cut risk of "mafia fraud" relay attacks.
Twitter wanted no part of a fight with the New York State Supreme Court.
Massachusetts Rep. Ed Markey's proposed Mobile Device Privacy Act is aimed at protecting device users.