For people to use a cyber solution, it has to be easy enough for the layman to understand without difficulty.
The Navy says dozens of IT systems and websites for pay and personnel functions are about to be killed off in favor of a consolidated system sailors can access from anywhere.
Steve Wallace, a systems innovation scientist in the Emerging Technology Directorate at the Defense Information Systems Agency, said the agency soon will choose vendors to develop a prototype to protect the network and data from attacks that come through web browsers.
Randy Wood, vice president of U.S. public sector sales for Akamai, said zero trust is not a new idea, but one that is about five years old. It promotes the simple concept that trust is not an attribute of location, and just because an employee is trusted inside perimeter, it doesn’t mean he or she should be granted access to all the information.
Given the edgeless nature of modern networks, and the need to limit trust and access of both external and internal users, more and more IT leaders are recognizing the need to replace yesterday’s authentication and access.
Radiant Logic’s differentiator is a three-letter phrase called “federated identity service.” This gives system administrators the flexibility to handle identity management quickly and safely.
Today’s cybersecurity threat landscape has completely changed from the years where a Common Access Card (CAC) or Personal Identity Verification (PIV) card could provide reasonable security. For example, in 2015 the United States Central Command Twitter account was hacked. The Department of Defense has limited ways to secure this resource well beyond any kind of current identity control.
The Defense Department and Veterans Administration tell Congress their still working out the bugs at their joint health care facility in Chicago.
The Defense Department is having a particularly tough time integrating mobile technology into its mission, largely because every attempt to link it to the Common-Access-Card has been too cumbersome. But DISA’s Purebred program may have found a way to bypass the CAC altogether.
Mobile is critical infrastructure for government agencies. See what a panel of six federal CIOs, CISOs, and CTOs say is the solution to securing mobile.