Zero-trust security architecture is changing the way IT leaders think about access to federal agency networks and resources. That includes how to meet the needs of employees and contractors for whom ...
L-1 Identity Solutions Inc. a provider of identity solutions and services, has expanded its line of government access control solutions with the release of the TWIC-Station, a new access control ...
The Defense Department is making a number of improvements to the Common Access Card to enhance identity authentication and physical and network security. DoD image When I consider the technologies ...
Phil Goldstein is a former web editor of the CDW family of tech magazines and a veteran technology journalist. He lives in Washington, D.C., with his wife and their animals: a dog named Brenna, and ...
DataLocker, Inc., a leader in hardware-encrypted data protection, today announced that its flagship Sentry 5 encrypted USB ...
The recent wave of highly public cyberattacks has cast a spotlight on last month’s White House executive order on cybersecurity, and the need for agencies to modernize their cybersecurity and ...
The U.S. Office of Personnel Management (OPM) addressed security vulnerabilities in its Federal “Cybersecurity Sprint,” stating that cybersecurity poses some of the most serious economic and security ...
U.S. Air Force Airman 1st Class Joseph Marchini, right, 100th Security Forces Squadron response force leader from East Lyme, Conn., performs a visual check of the photograph on a common access card of ...
The multifactor authentication standard is having a moment, but feds shouldn't expect to be able to ditch PIVs and CAC cards any time soon. Last year, Jen Easterly, the director of the Cybersecurity ...
The Defense Department has taken another step toward wider use of mobile devices with the approval of security credentials for Android, Apple and Microsoft devices used by vendors and other DOD ...
Associates, LP (BAI), a leader in secure authentication on mobile devices, announced today that DoD Unified Capabilities Approved Products List (APL) ...
A staggering amount of sensitive information, from personnel reviews to contracts and medical records, traverses the federal government’s computer network. Integral to this information-sharing process ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results