The Target breach case has the potential to define who has to write the checks to pay for the cleanup following a major breach.
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing in identity, privacy and security issues. Currently, he is the Identity Evangelist for cloud identity security vendor Ping Identity, where he blogs about relevant issues related to digital identity. Prior to Ping, John spent 15 years as a senior reporter for a variety of publications, including Communications Week, Internet Week and Network World, where he focused on enterprise topics including collaboration, directories, network infrastructure, databases, open source, ERP and security. He covered IBM, Microsoft, Cisco, Oracle, Red Hat, Google among other enterprise vendors. His work has also appeared in the New York Times, CNN, CIO and Mashable.
The malware variant also has its eye on online commerce, transaction authentication software
Union president says they were kept in dark, claims unfair labor practices in complaint to National Labor Relations Board.
Recent events highlight leaking data as threat to privacy, anonymity, security
A $15 million Postal Service access control program set to go live was separate from hacked network
Challenges ahead, but three major deployments have consortium feeling it is in right place at right time with right ideas
End-users will ultimately decide on the success of multi-factor authentication. Will the newest efforts toward that end help them make up their minds?
Kit lets app devs give end-users ability to use phone number for sign-up and log-in
The company is unveiling an option for developers to add extra strength and intelligence to the login process with policies, second-factor authentication and other techniques.
The international, cross-industry non-profit GlobalPlatform focuses on standardization, secure apps with Near-Field Communication and mobile as area of emphasis
Users are still clinging to hopes for the best without preparing for the worst, even with two-factor authentication and identity management advancements.
I changed jobs to get a front-row seat to see if end-users can lead a culture shift and bring on stronger, more secure authentication
Proposal focuses on balancing national security and end-user privacy.
Only 9 percent say they have a handle on the issue, according to SANS Institute survey.
Authentication tools are emerging to minimize hack exposure, but can they kill end-user apathy?