• Identity verification for govt services requires balancing security, ease of use

    For people to use a cyber solution, it has to be easy enough for the layman to understand without difficulty.

  • Navy to unplug decades-old personnel IT systems, clear way for app-based self service

    The Navy says dozens of IT systems and websites for pay and personnel functions are about to be killed off in favor of a consolidated system sailors can access from anywhere.

  • DISA wants to keep cyber attackers locked in web browser

    Steve Wallace, a systems innovation scientist in the Emerging Technology Directorate at the Defense Information Systems Agency, said the agency soon will choose vendors to develop a prototype to protect the network and data from attacks that come through web browsers.

  • Zero trust pushes agencies away from an outdated approach to cybersecurity

    Randy Wood, vice president of U.S. public sector sales for Akamai, said zero trust is not a new idea, but one that is about five years old. It promotes the simple concept that trust is not an attribute of location, and just because an employee is trusted inside perimeter, it doesn’t mean he or she should be granted access to all the information.

  • Authentication and authorization both due for major upgrade

    Given the edgeless nature of modern networks, and the need to limit trust and access of both external and internal users, more and more IT leaders are recognizing the need to replace yesterday’s authentication and access.

  • Securely managing access and identity in government

    Radiant Logic’s differentiator is a three-letter phrase called “federated identity service.” This gives system administrators the flexibility to handle identity management quickly and safely.

  • Federal Identity Governance

    Today’s cybersecurity threat landscape has completely changed from the years where a Common Access Card (CAC) or Personal Identity Verification (PIV) card could provide reasonable security. For example, in 2015 the United States Central Command Twitter account was hacked. The Department of Defense has limited ways to secure this resource well beyond any kind of current identity control.

  • DoD and VA still working out bugs at joint health care facility

    The Defense Department and Veterans Administration tell Congress their still working out the bugs at their joint health care facility in Chicago.

  • DISA explores solution to mobile CAC challenge

    The Defense Department is having a particularly tough time integrating mobile technology into its mission, largely because every attempt to link it to the Common-Access-Card has been too cumbersome. But DISA’s Purebred program may have found a way to bypass the CAC altogether.

  • Federal CIO Insights: What’s Next in Mobile Security

    Mobile is critical infrastructure for government agencies. See what a panel of six federal CIOs, CISOs, and CTOs say is the solution to securing mobile.