L-1 Identity Solutions Inc. a provider of identity solutions and services, has expanded its line of government access control solutions with the release of the TWIC-Station, a new access control ...
Strong authentication remains a cybersecurity priority under the Office of Management and Budget’s (OMB) cross-agency priority goals that were announced in the 2015 federal budget. In its 2015 budget ...
The recent wave of highly public cyberattacks has cast a spotlight on last month’s White House executive order on cybersecurity, and the need for agencies to modernize their cybersecurity and ...
The multifactor authentication standard is having a moment, but feds shouldn't expect to be able to ditch PIVs and CAC cards any time soon. Last year, Jen Easterly, the director of the Cybersecurity ...
The Defense Department is making a number of improvements to the Common Access Card to enhance identity authentication and physical and network security. DoD image When I consider the technologies ...
Associates, LP (BAI), a leader in secure authentication on mobile devices, announced today that DoD Unified Capabilities Approved Products List (APL) ...
Phil Goldstein is a former web editor of the CDW family of tech magazines and a veteran technology journalist. He lives in Washington, D.C., with his wife and their animals: a dog named Brenna, and ...
The U.S. Office of Personnel Management (OPM) addressed security vulnerabilities in its Federal “Cybersecurity Sprint,” stating that cybersecurity poses some of the most serious economic and security ...
ARLINGTON, VA and ARLINGTON, TX--(Marketwired - Oct 10, 2013) - Acronis®, a leading provider of data protection solutions, and Thursby Software, the market leader in secure Apple® enterprise ...
For decades, PIV and CAC cards have been the primary tools for agencies and contractors to verify the identity of employees and contractors. The COVID-19 outbreak could change that. Identity ...
PALO ALTO, Calif. & STOCKHOLM--(BUSINESS WIRE)--Yubico, the leading provider of hardware authentication security keys, today announced the general availability of its next-generation FIPS security ...
A staggering amount of sensitive information, from personnel reviews to contracts and medical records, traverses the federal government’s computer network. Integral to this information-sharing process ...