IT will need to integrate multiple management systems as "Things" take on identities and access controls
John Fontana's blog traverses the evolving digital identity landscape and its intersection with the cloud, compliance, audit, privacy, mobile computing, API integration and security.
John Fontana is a journalist focusing on access control, identity, privacy and security issues. Currently, he is the Identity Evangelist for strong authentication vendor Yubico, where he writes and edits a blog, as well as, directs several social media channels and represents Yubico at the FIDO Alliance. Prior to Yubico, John spent five years with identity vendor Ping Identity. He also spent 15 years as a senior editor for a variety of publications, including Communications Week, Internet Week and Network World, where he focused on enterprise topics including collaboration, directories, network infrastructure, databases, open source, ERP and security. He covered IBM, Microsoft, Cisco, Oracle, Red Hat, Google among other enterprise vendors. His work has also appeared in the New York Times, CNN, CIO and Mashable.
Retailer has collected $90 million in payouts on $100 million of network-security insurance coverage
Class-action suit stemming from 2012 incident could net each plaintiff up to $50
Microsoft focused on adopting FIDO 2.0 standard for strong authentication, but Windows 10 and everyone else will have to wait for spec's completion
Head of identity ecosystem initiative helped drive $30 million in pilot project funding
With interest growing around stronger authentication, both Red Hat and Microsoft will have multi-factor log-in built into their platforms by this summer
Agency doesn't stray far from present day best practices in suggesting security measures for handling a future with 50 billion devices
If history and initial reaction are any gauge, privacy advancements will have to come from somewhere besides the Oval Office or Congress
Administration's ongoing cybersecurity efforts will get revision next week, but what is still missing are details and progress
Innovation will confine passwords within a broader equation around authentication type plus value of resource
A 21 percent jump in fraud helps convince European Banking Authority to issue revised final set of directives planned for 2015 implementation.
The Sony take-down didn't provide many new lessons for IT, but did emphasize the fact that even those with plenty to lose still have a blind eye
State taking specific steps to protect $2.9 trillion in assets across 1,900 financial institutions
The Target breach case has the potential to define who has to write the checks to pay for the cleanup following a major breach.
The malware variant also has its eye on online commerce, transaction authentication software