The RSA Conference will kick off next week with the Cloud Security Alliance Summit, which examines issues from identity, to mobile to national security.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing in identity, privacy and security issues. Currently, he is the Identity Evangelist for cloud identity security vendor Ping Identity, where he blogs about relevant issues related to digital identity.
The black hats are getting more sophisticated, but unfortunately the white hats are making the same old rookie mistakes
FIDO Alliance aligns smart devices, authentication but will its scope be broad enough and its appeal wide enough.
Use of social network identities is expected to sky-rocket in the next two years, but it's aimed at reducing friction between merchants and your money, not because it's a better credential.
Google isn't just beginning to attack the password, in fact, it has been working since before 2010 on eliminating passwords and standardizing authentication on the Web.
Distributed cloud services and mobile-device clients are driving Web-friendly protocols for identity and security.
End-user generated passwords continue to have little defense against hackers, according to Deloitte Canada.
Forrester analyst Eve Maler says passwords will be an authentication method for the foreseeable future, but changes in IT attitudes can make that palatable.
The nearly two-year-old NSTIC effort is ready to commit more funding to building an online identity system to stimulate and secure online interaction and transactions.
A Texas school puts RFID-enabled ID cards around students' necks, adding a religious twist to an on-going identity and privacy debate.