Common Access Card

  • The Defense Department is in the final stages of a test to show how derived credentials from the Common Access Card can secure smartphones and tablet computers. Richard Hale, the deputy CIO for cybersecurity, boldly predicts that by the end of the calendar year the military will be issuing derived credentials on mobile devices.

    April 03, 2015
  • As the Defense Department builds out a technology infrastructure that's designed to be the latest generation of commercial mobile devices into users' hands, it's still unsure how to meet a key security requirement: identity management systems that comply with the military's existing requirements for secure user authentication.

    November 25, 2013
  • A look at the events shaping cybersecurity policy in the federal government over the past six years.

    October 24, 2012
  • The Defense Department is creating identity and access management tools as an enterprise service across the department. One possible way ahead, leaders say, is a single authoritative digital identity system the Defense Information Systems Agency created to support the Army\'s move to enterprise email.

    April 29, 2011
  • The Defense Department is making the Pentagon\'s physical access control system accept Common Access Cards. Currently, people who work at the Defense headquarters and other facilities must carry two secure identity cards. The Army also will test giving smart cards to retirees.

    February 24, 2011
  • The military issued its first secure identity card just about 10 years ago and now it\'s a part of the department\'s culture. The Pentagon is looking at how to expand the use of the Common Access Card to include transit benefits and electronic purse capabilities. The card, however, almost didn\'t get past the first pilot.

    February 23, 2011
  • Aired Wednesday, July 15th at 2:05pm With the recent decision by the Federal government to move to a Cloud Computing environment, the role of verifying the identity of an authorized user as well as defining their rights once inside the cloud presents a series of opportunities as well as challenges.

    June 30, 2009