identity and access management

Amelia Brust/Federal News Networkcybersecurity

NIST takes on major vulnerability in cyber guidelines through novel ‘patch release’

NIST is updating its seminal Special Publication 800-53, which forms the basis of federal cyber requirements, to address an urgent gap in identity and…

Read more
AP Photo/Eric GayFILE - In this Thursday, May 2, 2019 file photo, Border Patrol agents hold a news conference prior to a media tour of a new U.S. Customs and Border Protection temporary facility near the Donna International Bridge in Donna, Texas. President Joe Biden’s administration is refusing to allow lawyers who inspect facilities where immigrant children are detained to enter a Border Patrol tent in Texas where agents are holding hundreds of youths. The attorneys say they were allowed to speak to children at the facility in Donna on Thursday, March 11, 2021 but were denied the chance to see the areas where the youths were being held. (AP Photo/Eric Gay, File)

Customs and Border Protection uses large toolbox for identity and access management

Read more
State of Nebraska

Part 2: Nebraska’s centralized approach to cybersecurity, compliance in age of coronavirus

Read more

Executive Briefing Series: Identity and Access Management

Read more

One alternative to the CAC: DoD will identify you based on your walking behavior

Read more

Identity Access Management

Identity management is rising to the top of the list for many federal information technology professionals. Federal News Radio recently sat down with SailPoint…

Read more