Zero-trust security architecture is changing the way IT leaders think about access to federal agency networks and resources. That includes how to meet the needs of employees and contractors for whom ...
L-1 Identity Solutions Inc. a provider of identity solutions and services, has expanded its line of government access control solutions with the release of the TWIC-Station, a new access control ...
Strong authentication remains a cybersecurity priority under the Office of Management and Budget’s (OMB) cross-agency priority goals that were announced in the 2015 federal budget. In its 2015 budget ...
The recent wave of highly public cyberattacks has cast a spotlight on last month’s White House executive order on cybersecurity, and the need for agencies to modernize their cybersecurity and ...
The Defense Department is making a number of improvements to the Common Access Card to enhance identity authentication and physical and network security. DoD image When I consider the technologies ...
U.S. Air Force Airman 1st Class Joseph Marchini, right, 100th Security Forces Squadron response force leader from East Lyme, Conn., performs a visual check of the photograph on a common access card of ...
When the White House released Homeland Security Presidential Directive 12 in 2004, mandating the development and use of an interoperable smart ID card for government employees and contractors, ...
Associates, LP (BAI), a leader in secure authentication on mobile devices, announced today that DoD Unified Capabilities Approved Products List (APL) ...
The U.S. Office of Personnel Management (OPM) addressed security vulnerabilities in its Federal “Cybersecurity Sprint,” stating that cybersecurity poses some of the most serious economic and security ...
Phil Goldstein is a former web editor of the CDW family of tech magazines and a veteran technology journalist. He lives in Washington, D.C., with his wife and their animals: a dog named Brenna, and ...
The Defense Department has taken another step toward wider use of mobile devices with the approval of security credentials for Android, Apple and Microsoft devices used by vendors and other DOD ...
A staggering amount of sensitive information, from personnel reviews to contracts and medical records, traverses the federal government’s computer network. Integral to this information-sharing process ...