Shows & Panels
- The 2014 Big Picture on Cyber Security
- AFCEA Answers
- Ask the CIO
- Connected Government
- Consolidating Mission-critical Systems
- Constituent Servicing
- The Data Privacy Imperative: Safeguarding Sensitive Data
- Eliminating the Pitfalls: Steps to Virtualization in Government
- Federal Executive Forum
- Federal Tech Talk
- Government Cloud Brokerage: Who, What, When, Where, Why?
- Government Mobility
- The Intersection: Where Technology Meets Transformation
- Maximizing ROI Through Data Center Consolidation
- Mobile Device Management
- The Modern Federal Threat Landscape
- Moving to the Cloud. What's the best approach for me
- Navigating Tough Choices in Government Cloud Computing
- Satellite Communications: Acquiring SATCOM in Tight Times
- Transformative Technology: Desktop Virtualization in Government
- Understanding the Intersection of Customer Service and Security in the Cloud
Shows & Panels
Search Tags: biometrics
The Mark Center soon will require employees to provide a fingerprint or iris scan along with the CAC card to enter the facility. The Pentagon is next to implement biometric factors for physical access control. The Army also is looking at where biometrics could impact mission and business functions.
Steve Vinsik, vice president and partner, Global Security Solutions for Unisys Corporation, joins host John Gilroy to talk about biometrics, border protection, air cargo, and telework.
January 3, 2012
Tags: technology , Unisys , border protection , telework , NSTIC , biometric security , Unisys Security Index , malware , Steve Vinsik , John Gilroy , Federal Tech Talk , cloud computing , cyber security
The Homeland Security's U.S. Visitor and Immigrant Status Indicator Technology Program still is developing recommendations and options for Secretary Janet Napolitano for how to implement the land exit portion of the entry-exit system.
Biometrics, more card memory giving military more options. In the future, employees may be able to use federal ID cards on metro.
A new NIST report demonstrates that iris recognition algorithms can maintain their accuracy and interoperability with compact images, affirming their potential for large-scale identity management applications such as the federal Personal Identity Verification program, cyber security and counterterrorism.
Secure Communities: A Comprehensive Plan to Identify and Remove Criminal Aliens (Secure Communities) is working with ICE senior leadership and offices, as well as the broader law enforcement community, to better identify criminal aliens, prioritize enforcement actions on those posing the greatest threat to public safety, and transform the entire criminal alien enforcement process.
The State Department in late January began testing the use of digital certificates on Microsoft Word and Excel documents, using the Group Policy Object function to digitally lock down Microsoft Office so employees does not use any macros that are not approved by State.
The task order was awarded under the Information Technology Enterprise Solutions 2 Services indefinite delivery, indefinite quantity contract by the U.S. Army Contracting Command - National Capital Region.
The Department of Homeland Security already has real-time access to biometric data maintained in the FBI's huge database of criminal records. Within the next year, it'll be able to share similar data with the Defense Department.