bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
9:56 am, April 18, 2015

Search Result

Search Tags:  identity management

Agencies still sharing after WikiLeaks

Fears that the leak of thousands of State Department memos to the website WikiLeaks would reverse progress on interagency sharing of national security information have not materialized, officials testified Thursday. Agencies have responded by recognizing the need to protect data rather than by hoarding it, they said.

Tags: DoD , Congress , technology , information sharing , State Department , Director of National Intelligence , James Clapper , Teri Takai , Corin Stone , Patrick Kennedy , WikiLeaks , Joseph Lieberman , Susan Collins , Senate Homeland Security and Governmental Affairs , secure identity cards , CACs , public key infrastructure , SIPRNet , Jared Serbu

Friday - 03/11/2011, 07:19am EST
Listen

Pentagon to make building access easier

The Defense Department is making the Pentagon's physical access control system accept Common Access Cards. Currently, people who work at the Defense headquarters and other facilities must carry two secure identity cards. The Army also will test giving smart cards to retirees.

Tags: technology , DoD , Mary Dixon , Pentagon Force Protection Agency , Defense Manpower Data Center , Army , Interagency Smartcard Advisory Board , secure identity card , Common Access Card , physical access control , HSPD-12 , Jason Miller

Thursday - 02/24/2011, 07:40am EST
Listen

10 years later, CAC is securely part of DoD

The military issued its first secure identity card just about 10 years ago and now it's a part of the department's culture. The Pentagon is looking at how to expand the use of the Common Access Card to include transit benefits and electronic purse capabilities. The card, however, almost didn't get past the first pilot.

Tags: technology , DoD , Mike Butler , Defense Manpower Data Center , secure identity card , HSPD-12 , Common Access Card , PKI , Jason Miller

Wednesday - 02/23/2011, 07:06am EST
Listen

Exclusive: DHS mandates HSPD-12 card use

The long-awaited memo requires agencies to develop a plan to implement physical and computer network access controls. DHS and GSA are also working together to help agencies improve physical access control.

Tags: Management , technology , Greg Shaffer , DHS , OMB , GSA , HSPD-12 , secure identity cards , physical access control , Jason Miller

Friday - 02/04/2011, 07:26am EST

OMB, DHS working on new HSPD-12 guidance

The memo is part of a broader effort to improve authentication to computers and buildings across government using secure identity cards. The White House also is close to finalizing the National Strategy for Trusted Identities in Cyberspace. President Obama could sign the strategy this winter.

Tags: technology , Phil Reitinger , Ari Schwartz , DHS , GSA , NIST , OMB , TechAmerica , HSPD-12 , cybersecurity , National Strategy for Trusted Identities in Cybers , Jason Miller

Friday - 11/05/2010, 07:14am EDT
Listen

Is Trust the next "Killer App"?

August 12th, 2010 at 11 AM

How does one assure trust in Cyberspace? As citizens, government, and business enterprise increase the amount of information that is shared online, fundamental questions arise around security requirements, data and identity management, and infrastructure. Trusted online environments can reduce costs, expand services, and are critical to protecting how, and to whom, information is shared. Securing identities in transactions is an essential component to building trusted online systems and a critical priority for both business and government. As online information sharing and collaborative services evolve between people and technologies, will trust emerge as the next "Killer App"?

Tags: technology , Expert Voices presented by Booz Allen , Booz Allen , Expert Voices , Citi , Citibank , NSTIC , trust , trusted services , trust framework , securing identity , cybersecurity , cyber , cyberspace , Michael Farber , IT , John Clippinger , Berkman Center for Internet & Society , Dr. Jeff Voas , NIST , Hilary Ward , Global Transaction Services

Monday - 08/02/2010, 03:06pm EDT
Listen

White House cyberspace draft strategy released

IG: pilot information is at risk, Billions to be spent on smartgrid cybersecurity

Tags: Federal Drive , Cybersecurity Update , White House , cybersecurity , National Strategy for Trusted Identities in Cybers , FAA , Contracting , Pike Research , CyberSecurity Seminars , Tom Billington

Monday - 06/28/2010, 08:30am EDT

White House to give identity management a push

Cyber coordinator Schmidt says the administration will issue a draft national strategy for secure online transactions by Friday. The goal is to make identity management easy to use, secure and interoperable to conduct business with the government and the private sector. Schmidt says transactions are key to everything the White House wants to do.

Tags: technology , Howard Schmidt , Ely Kahn , White House , GSA , DoD , Symantec , cybersecurity , secure online transactions , HSPD-12 , Jason Miller

Wednesday - 06/23/2010, 06:38am EDT
Listen

Justice moves closer to secure sharing

Department to lead the roll out of a federated identity management system for all law enforcement agencies. Justice ran a pilot and now plans on expanding the system nationwide by the end of 2010. The goal is to use technology that already exists and focus on standards and policies.

Tags: technology , Jeremy Warren , Justice , DoJ , DHS , Criminal Justice Information Services , AFCEA , information sharing

Wednesday - 04/21/2010, 07:14am EDT
Listen
  •  
  • 7
  •