authentication system

July 19, 2016
By Joe Kim

It wasn’t too long ago that the Defense Department embarked on a Cybersecurity Discipline Implementation Plan identifying specific tasks that department’s IT personnel must perform to reinforce basic cybersecurity requirements identified in policies, directives and orders across the agency.

The plan, publicly unveiled in March after being amended, segments tasks into four key “lines of effort” to strengthen cybersecurity initiatives:

June 17, 2011
By Beverly Schaeffer

With a new authentication framework that automatically provides identity, the Czech Republic is proving that electronic security access doesn't have to be compromised for ease of use. The system, known as the Automatic Liberal and User-Centric Electronic Identity, or ALUCID, gives users the best of both worlds.