Zero-trust security architecture is changing the way IT leaders think about access to federal agency networks and resources. That includes how to meet the needs of employees and contractors for whom ...
Strong authentication remains a cybersecurity priority under the Office of Management and Budget’s (OMB) cross-agency priority goals that were announced in the 2015 federal budget. In its 2015 budget ...
L-1 Identity Solutions Inc. a provider of identity solutions and services, has expanded its line of government access control solutions with the release of the TWIC-Station, a new access control ...
The recent wave of highly public cyberattacks has cast a spotlight on last month’s White House executive order on cybersecurity, and the need for agencies to modernize their cybersecurity and ...
The Defense Department is making a number of improvements to the Common Access Card to enhance identity authentication and physical and network security. DoD image When I consider the technologies ...
U.S. Air Force Airman 1st Class Joseph Marchini, right, 100th Security Forces Squadron response force leader from East Lyme, Conn., performs a visual check of the photograph on a common access card of ...
When the White House released Homeland Security Presidential Directive 12 in 2004, mandating the development and use of an interoperable smart ID card for government employees and contractors, ...
Phil Goldstein is a former web editor of the CDW family of tech magazines and a veteran technology journalist. He lives in Washington, D.C., with his wife and their animals: a dog named Brenna, and ...
The U.S. Office of Personnel Management (OPM) addressed security vulnerabilities in its Federal “Cybersecurity Sprint,” stating that cybersecurity poses some of the most serious economic and security ...
Acronis and Thursby Software have announced the delivery of what they describe as the first mobile file management solution to include Common Access Card and Personal Identity Verification ...
A staggering amount of sensitive information, from personnel reviews to contracts and medical records, traverses the federal government’s computer network. Integral to this information-sharing process ...
PALO ALTO, Calif. & STOCKHOLM--(BUSINESS WIRE)--Yubico, the leading provider of hardware authentication security keys, today announced the general availability of its next-generation FIPS security ...