Shows & Panels
Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- American Readiness: Renewable Power and Efficiency Technologies
- Ask the CIO
- Building the Hybrid Cloud
- Connected Government: How to Build and Procure Network Services for the Future
- Continuing Diagnostics and Mitigation: Discussion of Progress and Next Steps
- Federal Executive Forum
- Federal News Radio's National Cyber Security Awareness Month Special Panel Discussion
- Federal Tech Talk
- The Future of Government Data Centers
- The Future of IT: How CIOs Can Enable the Service-Oriented Enterprise
- Government Perspectives on Mobility and the Cloud
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mitigating Insider Threats in Virtual & Cloud Environments
- Modern Mission Critical Series
- The New Generation of Database
- Reimagining the Next Generation of Government
- Targeting Advanced Threats: Proven Methods from Detection through Remediation
- Transformative Technology: Desktop Virtualization in Government
- The Truth About IT Opex and Software Defined Networking
- Air Traffic Management Transformation Report
- Cloud First Report
- General Dynamics IT Enterprise Center
- Gov Cloud Minute
- Government in Technology Series
- Homeland Security Cybersecurity Market Report
- National Cybersecurity Awareness Month
- Technology Insights
- The Cyber Security Report
- The Next Generation Cyber Security Experts
Shows & Panels
Search Tags: HSPD 12
The White House wants the government to lead a nationwide effort to reduce identity theft and fraud. More secure government credit cards and multi-factor authentication for federal websites dealing with sensitive citizen data are two ways to do that.
Tags: technology , cybersecurity , White House , GSA , Treasury , Barack Obama , SANS Institute , Alan Paller , John Pescatore , identity management , government charge cards , identity theft , Inside the Reporters Notebook , Jason Miller
The Insider Threat Task Force expects to submit its national plan to the White House in the next few months. The Defense Department will use its secure identity cards to stop unauthorized access to data and systems.
Tags: technology , management , ODNI , FBI , Gordon Snow , John Swift , Rob Carey , DoD , Diana Braun , Insider Threat Task Force , White House , secure identity card , identity management , PKI , information sharing , WikiLeaks , insider threat , FOSE , Jason Miller
Center CIO Mike Bolger said encrypting laptops and implementing logical access are among his top priorities in 2012. Kennedy Space Center also is exploring how to let employees using their personal smartphones or tablet computers on the network.
March 29, 2012
The goal of the revised FIPS-201-2 will detail at a high level how agencies can integrate secure smart cards with mobile devices. NIST is considering five options for making HSPD-12 cards work with tablets and smart phones.
August 4th, 2009
Are you the person you say you are? How can one person be sure of the answer when critical information is being shared on the web?
The Defense Department is looking for the same benefits from RFID as Wal-Mart.
GSA certified that GPO complies with the Federal Information Processing Standard 201, which sets requirements to ensure that identification cards are secure and resistant to fraud. GSA's David Temoshok explains the process for us.