Ping Identity > Blogs Overview 

Welcome to Our Identity Security Blog Portal

Whether you’re exploring the industry or deploying Ping products, our bloggers uncover and analyze trends that are important to you. Enjoy our posts. More importantly, join the conversation. Questions, comments and conversations are strongly encouraged.

Featured Blog Posts

View All Blog Posts »
April 24, 2014
John Fontana

The credential duo we love to hate -  username and password - is under attack like never before. The 2014 Verizon Data Breach Investigation Report released this week identified the use of stolen credentials as the top threat action in this year's survey; 422 incidents involved the use of a stolen ...Read more

March 4, 2014
Andrew King

We here at Ping Identity are doing our best to get rid of passwords, as fast as we can. Sadly, however, you and I still deal with passwords. Every day. So we're used to notifications. Maybe you get an email. A status bar pop-up. Or some other fancy notification method. What about your PingFederate ...Read more

April 23, 2014
Mark Perry

It was buried in the final use case of the Proof of Concept (POC) document but it intrigued me straight away. "The following proof point is considered 'should' or 'optional' for the POC execution, time permitting: Authentication - Present a wearable device instead of PIN." The POC was for a prospect ...Read more

April 22, 2014
John Fitzgerald

If you're like me, when companies tout their products and solutions as the best in the business and superior to none, etc., you can't help but be skeptical and say: "OK prove it." As smart consumers, we should ask for the proof. And so it is with Ping Identity and what we offer. That said, what ...Read more


Recent Blog Posts

View All Blog Posts »

Ping Talk Blog


April 24, 2014
John Fontana

The credential duo we love to hate -  username and password - is under attack like ...Read more

12 Views
April 21, 2014
John Fontana
April 17, 2014
John Fontana

Support Blog


March 4, 2014
Andrew King

We here at Ping Identity are doing our best to get rid of passwords, as fast as we ...Read more

82 Views
February 11, 2014
Stephen Gilson
January 23, 2014
Patricia Rose

Identity Forward Blog


April 22, 2014
John Fitzgerald

If you're like me, when companies tout their products and solutions as the best in the ...Read more

15 Views
April 14, 2014
Chris Wachel
April 10, 2014
John Fitzgerald

CTO Blog


April 23, 2014
Mark Perry

It was buried in the final use case of the Proof of Concept (POC) document but it ...Read more

42 Views
April 21, 2014
Mance Harmon
April 16, 2014
Paul Madsen