But agencies may not be taking the right steps to mitigate the account takeovers. Fraud threats to government agencies have increased in frequency and severity during...
With the traditional perimeter gone, identity management is the new boundary. If government, education, non-profit, health care and other public-sector organizations hadn’t embraced the digital revolution before,...
As agencies rethink making temporary remote arrangements permanent, officials should start with proven ubiquitous encryption technology. The COVID-19 pandemic has forced many organizations to adapt to...
One primary consideration should drive implementation: who gets to see what content? Recently issued Executive Order 14028 serves as a call to action for the federal government, in...
It’s time to stop relying on knowledge-based authentication. President Joe Biden’s cybersecurity agenda is rapidly taking shape. Keenly aware of the destruction wrought by the SolarWinds...
The federal government is looking to partner with state and local governments to grow its Login.gov service, which it says is secure and user friendly. The...
Some programs are already operating under a zero trust framework, but the enterprise as a whole still needs basic tools for things like identity, credentials and...
“Identity is everything now,” a technical strategist told NIST advisers in a briefing on the hacking campaign. The way the adversary behind the SolarWinds hack used legitimate credentials...
Like many other sectors, the space industry needs to secure its supply chain from start to finish. Since President John F. Kennedy announced plans for a...
The draft of the cybersecurity-focused document was completed in October and is going through a content review, assessment and approval process. The Defense Department has completed...
Recent Comments