The National Strategy for Trusted Identities in Cyberspace is considering commercial cloud services for authenticating third-party credentials of users accessing government websites.
Software being developed by Optio Labs would control data access and app use depending on location, time of day, other apps in use and even who you’re with.
Groups will run a variety of pilots for trusted identities covering areas ranging from first-responder authentication and secure business transactions to the exchange of health care information.
With threats on the rise and skills at a premium, how do cybersecurity personnel close the technology and resource gaps?
NSTIC is funding five pilot programs that mark a major step toward creating a digital identity ecosystem to enable greater online transactions by government and the private sector.
With an eye toward protecting patient privacy, HHS offers tools for keeping health data protected on mobile devices -- advice that any public-sector agency could follow.
Good Technology's product fits over an iPhone 4 or 4s and contains a smart-card or microSD reader for two-factor authentication.
A list of information security terms from federal documents is being updated by NIST to provide a central resource of common terms and definitions.
The all-too-easy hack of South Carolina's Department of Revenue could have been prevented by a dual-password system. How does it work?
The Florida city is building out a city-wide digital video surveillance system and is using a management system to integrate feeds so police can get real-time views of the city.
Suite lets administrators manage rules and encryption profiles of notebooks and smart phones from a single console.
Cryptography is only as secure as the keys used to encrypt and decrypt data. NIST shows agencies how to make them strong.