multi-factor authentication

Amelia Brust/Federal News Network

Federal payroll website for over 170 agencies gets a cybersecurity update

The National Finance Center just implemented a multifactor authentication system for agencies to access employee payroll data, and more cybersecurity updates…

Read more

Final zero trust strategy both prescriptive, flexible enough to achieve end goals

Read more
AP Photo/Eric GayFILE - In this Thursday, May 2, 2019 file photo, Border Patrol agents hold a news conference prior to a media tour of a new U.S. Customs and Border Protection temporary facility near the Donna International Bridge in Donna, Texas. President Joe Biden’s administration is refusing to allow lawyers who inspect facilities where immigrant children are detained to enter a Border Patrol tent in Texas where agents are holding hundreds of youths. The attorneys say they were allowed to speak to children at the facility in Donna on Thursday, March 11, 2021 but were denied the chance to see the areas where the youths were being held. (AP Photo/Eric Gay, File)

Customs and Border Protection uses large toolbox for identity and access management

Read more
(Amelia Brust/Federal News Network)

Federal cyber agencies call zero trust ‘new normal’ of security, partnering to implement

Read more
Getty Images/iStockphoto/HYWARDSCISA

How agencies can balance good customer experience with the need for lots of security

Read more

How to choose the right multifactor authentication program

Many agencies have turned to commercial multifactor authentication solutions as an alternative to PIV cards with a huge chunk of the federal workforce…

Read more
Linkedin

Other methods to determine who’s eligible for government benefits

IRS staff members knew ahead of time that some of the individual payments for pandemic relief would go to the deceased because of how timely vital records…

Read more
(Getty Images/iStockphoto/Poike)Men is typing on laptop computer keyboard

For the federal government, endpoints have left the building

As they transition, Federal agencies must continue to defend against threats on their existing infrastructure while extending that protection to the exploding number of remote endpoints connecting to their networks.

Read more