Jacob resigned in wake of re-org after retailer's massive breach
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing on access control, identity, privacy and security issues. Currently, he is the Identity Evangelist for strong authentication vendor Yubico, where he writes and edits a blog, as well as, directs several social media channels and represents Yubico at the FIDO Alliance. Prior to Yubico, John spent five years with identity vendor Ping Identity. He also spent 15 years as a senior editor for a variety of publications, including Communications Week, Internet Week and Network World, where he focused on enterprise topics including collaboration, directories, network infrastructure, databases, open source, ERP and security. He covered IBM, Microsoft, Cisco, Oracle, Red Hat, Google among other enterprise vendors. His work has also appeared in the New York Times, CNN, CIO and Mashable.
Report says lack of basic password security was a top concern among researchers and a major factor in data breaches during 2014
Majority of agencies not meeting goals for improving access controls beyond simple usernames and passwords
IT will need to integrate multiple management systems as "Things" take on identities and access controls
Retailer has collected $90 million in payouts on $100 million of network-security insurance coverage
Class-action suit stemming from 2012 incident could net each plaintiff up to $50
Microsoft focused on adopting FIDO 2.0 standard for strong authentication, but Windows 10 and everyone else will have to wait for spec's completion
Head of identity ecosystem initiative helped drive $30 million in pilot project funding
With interest growing around stronger authentication, both Red Hat and Microsoft will have multi-factor log-in built into their platforms by this summer
Agency doesn't stray far from present day best practices in suggesting security measures for handling a future with 50 billion devices
If history and initial reaction are any gauge, privacy advancements will have to come from somewhere besides the Oval Office or Congress
Administration's ongoing cybersecurity efforts will get revision next week, but what is still missing are details and progress
Innovation will confine passwords within a broader equation around authentication type plus value of resource
A 21 percent jump in fraud helps convince European Banking Authority to issue revised final set of directives planned for 2015 implementation.
The Sony take-down didn't provide many new lessons for IT, but did emphasize the fact that even those with plenty to lose still have a blind eye
The best of ZDNet, delivered
- 1 Researchers say WeMo devices flawed, suggest deactivating
- 2 Google unveils 5-year roadmap for strong authentication
- 3 Seven ways identity, access management will change in the enterprise
- 4 Citadel malware attacking open source password managers
- 5 AWS folds Facebook, Google credentials into new ID federation tools