At its annual Identity and Access Management conference, Gartner says computing trends are fueling enterprise interest in ID.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing on access control, identity, privacy and security issues. Currently, he is the Identity Evangelist for strong authentication vendor Yubico, where he writes and edits a blog, as well as, directs several social media channels and represents Yubico at the FIDO Alliance. Prior to Yubico, John spent five years with identity vendor Ping Identity. He also spent 15 years as a senior editor for a variety of publications, including Communications Week, Internet Week and Network World, where he focused on enterprise topics including collaboration, directories, network infrastructure, databases, open source, ERP and security. He covered IBM, Microsoft, Cisco, Oracle, Red Hat, Google among other enterprise vendors. His work has also appeared in the New York Times, CNN, CIO and Mashable.
Router maker adds the controversial technology to its line of hardware for home and small business.
The future of human-computer interaction was the theme at the Blur conference's jaw-dropping demo day.
Thought-controlled computing hits a milestone next summer and InteraXon CEO Ariel Garten is pushing the envelop - with her mind.
The Wired senior reporter is taking up the case against passwords - and with good reason.
Existing IT identity management systems don't provide the fuel to run cloud's motor for privacy, security
Restful and stateless will begin to define enterprise identity next year as social IDs, mobile devices, cloud services and modern day Web and development protocols move in and force changes.
The Society for Worldwide Interbank Financial Telecommunication (SWIFT) has unveiled a prototype for a Digital Asset Grid that would give individuals and companies privacy and secure asset exchange.
If enterprises want to tap into identity-management-as-a-service they better know the trust models in use.
A small conference on identity has evolved over the past seven years into a sort of incubator that powers the innovation and collaboration pump for user-centric ID.
The Open Identity Exchange and Google developer evangelist Tim Bray are trying to revolutionize the log-in box and eliminate password headaches for both consumers and the enterprise.
What can small businesses do to improve online policies and procedures?
Small businesses often kidding themselves on cybersecurity, survey reveals.
OAuth 2.0 is officially blessed, now it's on to fulfilling the promise of securing access to, and integration among, applications.
Researchers say hackers could easily spread their attack after gaining Windows passwords.