Numerous high-profile cybersecurity breaches over the past year have changed the way we think about infrastructure, prompting a reevaluation of what must be done to protect the assets that ensure national security and the resources that safeguard our competitiveness as a nation.
The tech company is working with states to create digital IDs from driver’s licenses for the Apple’s Wallet app.
Until facial recognition technologies are better understood, their use in consequential applications should be halted until they can be properly regulated.
Zero-trust architecture will help agencies detect and prevent potential breaches, not just react to ones that already happened.
The continuous data flow from automated testing gives agencies the insights they need to effectively modify inadequate security tools and programs and better prepare for future cyberattacks.
Many of this year’s winners were chosen for their work securing the federal government’s IT systems against bad actors looking to take advantage of the chaos caused by the pandemic and election misinformation.
As part of its remote identity proofing process, the General Services Administration wants to remotely validate government IDs issued through Login.gov.
Fraudsters are sending out emails and texts saying that an expired driver’s license must be updated and directing victims to online forms that collect personal information such as a Social Security numbers and dates of birth.
The Federal Risk and Authorization Management Program is pushing adoption of the Open Security Controls Assessment Language to enable automated reviews.
A GAO survey of 24 agencies found facial recognition technology has been primarily used for digital access, law enforcement or cyber and physical security, but some agencies are researching new applications.