Identity & Access Management

The Defense Department is having a particularly tough time integrating mobile technology into its mission, largely because every attempt to link it to the Common-Access-Card has been too cumbersome. But DISA’s Purebred program may have found a way to bypass the CAC altogether.

With 85 percent of agencies using smart identity cards to log onto computer networks, they’re starting to look ahead to the next phase of identity management: controlling who gets access to what information, and when.

Are fingerprints better than passwords for securing government systems? That’s what the National Strategy for Trusted Identities in Cyberspace is trying to determine.