identity management

  • A memo from federal CIO Steven VanRoekel requires agencies to begin accepting usernames and passwords from commercial companies such as Verisign or Google. This is the second time the government has tried to accept commercial credentials. Experts say this time agencies and industry are better prepared to be successful.

    October 14, 2011
  • The Department of Homeland Security wants states to describe how they are complying with the 2005 law.

    July 18, 2011
  • The agency teams up with the SAFE BioPharma Association to digitally sign documents and improve the time it takes to get clinical trials going. NCI and the association are using the standards developed by the Federal Bridge. The two organizations are putting the concepts in the National Strategy for Trusted Identities in Cyberspace (NSTIC) into practice.

    July 07, 2011
  • The Defense Department is creating identity and access management tools as an enterprise service across the department. One possible way ahead, leaders say, is a single authoritative digital identity system the Defense Information Systems Agency created to support the Army\'s move to enterprise email.

    April 29, 2011
  • White House strategy gives the Commerce Department bureau the ability to bring industry, privacy, security and other experts together to develop policies and standards. The administration made it clear the private sector will lead the effort and the government is only creating a marketplace for these services.

    April 18, 2011
  • The Defense Department will begin taking Social Security numbers off of the ID cards held by DoD employees and retirees. The changes, part of a 2008 SSN reduction plan, will begin in June, officials said.

    April 04, 2011
  • Fears that the leak of thousands of State Department memos to the website WikiLeaks would reverse progress on interagency sharing of national security information have not materialized, officials testified Thursday. Agencies have responded by recognizing the need to protect data rather than by hoarding it, they said.

    March 11, 2011
  • The Defense Department is making the Pentagon\'s physical access control system accept Common Access Cards. Currently, people who work at the Defense headquarters and other facilities must carry two secure identity cards. The Army also will test giving smart cards to retirees.

    February 24, 2011
  • The military issued its first secure identity card just about 10 years ago and now it\'s a part of the department\'s culture. The Pentagon is looking at how to expand the use of the Common Access Card to include transit benefits and electronic purse capabilities. The card, however, almost didn\'t get past the first pilot.

    February 23, 2011
  • The long-awaited memo requires agencies to develop a plan to implement physical and computer network access controls. DHS and GSA are also working together to help agencies improve physical access control.

    February 04, 2011
  • By Jason Miller Executive Editor Federal News Radio For the second time in six months, the National Institute of Standards and Technology snagged another expert from industry. NIST announced Monday that Jeremy Grant will manage…

    February 01, 2011
  • By Jason Miller Executive Editor Federal News Radio Judy Spencer, who led several of the government’s efforts around public key infrastructure and identity management, retired from government after 36 years. Spencer’s last day at the…

    January 31, 2011
  • The memo is part of a broader effort to improve authentication to computers and buildings across government using secure identity cards. The White House also is close to finalizing the National Strategy for Trusted Identities in Cyberspace. President Obama could sign the strategy this winter.

    November 05, 2010
  • August 12th, 2010 at 11 AM How does one assure trust in Cyberspace? As citizens, government, and business enterprise increase the amount of information that is shared online, fundamental questions arise around security requirements, data and identity management, and infrastructure. Trusted online environments can reduce costs, expand services, and are critical to protecting how, and to whom, information is shared. Securing identities in transactions is an essential component to building trusted online systems and a critical priority for both business and government. As online information sharing and collaborative services evolve between people and technologies, will trust emerge as the next \"Killer App\"?

    August 02, 2010