identity management

October 13, 2020
By Julianne Simpson
Credit: SailPoint

Many agencies today lack a way to effectively and securely govern access across multicloud environments. Though the use of multiple cloud platforms such as AWS, Azure and Google give agencies the freedom to match the requirements of each use case to the unique strengths of each cloud platform, it also leaves businesses vulnerable to the risks and costs of noncompliance, cyber attacks and human error.

Lack of governance can also stifle productivity and growth—if users can’t get the access they need when they need it, work doesn’t get done. Managing who has access to what and with which privileges is a major challenge in the cloud due to rapid change and its large scale.

September 10, 2020
By Kimberly Underwood
Mobile devices could service as an identity platform for the U.S. government, providing a contactless access experience with more privacy, some experts say. Credit: Shutterstock/Drazen Zigic

The U.S. federal government should consider implementing a digital identity for each citizen and enable the use of mobile devices for in-person access and other applications, experts say. Mobile devices, paired with strong standards, can enable physical access to federal buildings—as the common access card, or CAC, does currently. In addition, employing more digitally integrated, holistic systems would improve privacy. And given the onset of COVID-19, the pandemic has heightened the need for innovation, especially around contactless technologies, said officials speaking yesterday at the Federal Identity Virtual Collaboration Event.

September 9, 2020
By Kimberly Underwood
Credit: Shutterstock/Golden Sikorka

States across the country are facing challenges around the ability to provide services and benefits during COVID-19. The underlying factor is how jurisdictions can verify and trust a citizen’s identity when the citizen cannot appear in person due to the pandemic, experts say.

“On the states’ side, if we think about how we as citizens establish our identity in our day-to-day lives, in most cases, we use our driver’s license,” said Tracy Hulver, senior director, Digital Identity, Idemia.

Hulver spoke about increasing trends in identity management during the Federal Identity Virtual Collaboration event on September 8.

September 1, 2020
By Kimberly Underwood
The increase in the remote workforce due to the pandemic has highlighted calls for increased digital identity management. Credit: Shuterstock/Enzozo

Today’s identity management is fragmented and decentralized, relying on a lot of different systems to authenticate people and manage identities. Organizations use a variety of disjointed tools from passwords and smart cards to biometrics. Instead, organizations should pursue a more holistic approach.

February 1, 2020
By Shaun Waterman
Spc. Damaris Vazquez, USA, an orderly room clerk with 90th Human Resources Company, Special Troops Battalion, 3rd Infantry Division Sustainment Brigade, Fort Stewart, Georgia, scans a common access card at Fort Jackson, South Carolina, to process soldiers in units assisting with Hurricane Florence relief efforts. Credit: Sgt. Elizabeth White, USA/Released

The Pentagon is looking to buy an enterprisewide identity management system to provide a single authoritative source of user information, identity authentication and information technology access for millions of U.S. Defense Department computer network users. The Defense Information Systems Agency’s call for white papers on the development and deployment of a Defense Department Enterprise Identity Service is the first step in identifying two or three vendors to take part in a competitive prototyping contest under an other transaction authority effort.

September 24, 2019
By Shaun Waterman
(l-r) Monte Hawkins, director of the National Vetting Center, Charles Bartoldus, former official and now senior advisor to CT-Strategies, ODNI Identity Intelligence Executive Kathleen Lane, DHS CIO official Emily Barbero, NVC Chief of Staff Casie Antalis and NVC Technical Director Lori Vislocky speak at AFCEA International's Federal identity Forum and Expo in Tampa, Florida. Credit: Shaun Waterman

To guard America’s borders against a lengthening list of threats, the new interagency National Vetting Center (NVC) is flipping the script on watchlisting, officials said Monday.

Instead of compiling lists of individuals believed linked to terrorism or some other threat, the NVC is figuring out how to leverage all the information held by U.S. government agencies about any individual applying for entry to the country, the center’s director, Monte Hawkins, told AFCEA International’s Federal Identity Forum and Expo in Tampa, Florida.

September 1, 2019
By Robert K. Ackerman
Many experts think the future of identity verification is a single authentication that applies across all disciplines of verification. Credit: ktsdesign/Shutterstock

The secret word is out and crypto is in as government and commercial experts lay the groundwork for the next generation of identity proving and authentication. Passwords are being abandoned in favor of a range of new methods that are more secure and, in some cases, more user friendly.

Biometrics are just part of the solution. They have been paired with public key cryptography in preliminary efforts. Ultimately, the solution may emerge from an entirely new concept of identity that applies across a broad spectrum of applications.

May 15, 2019
By George I. Seffers
Vice Adm.Nancy Norton, USN, director, DISA, and commander, JFHQ-DODIN, addresses the TechNet Cyber conference. Photo by Michael Carpenter

The Defense Information Systems Agency (DISA) is acquiring an array of cutting-edge technologies using rapid development processes and could begin fielding some of those technologies within the next two years.

December 1, 2018
By Shaun Waterman
Credit: sp3n/Shutterstock

Powered by recent advances in artificial intelligence and machine learning, long-hyped technologies such as facial recognition and behavioral biometrics are promising frictionless identity authentication. In the near future, people will be able prove who they are without even trying and sometimes without even knowing they’re doing it.

September 25, 2018
By Shaun Waterman

Biometric databases held by the Defense Department, the FBI and the Department of Homeland Security will be able to communicate with each other seamlessly for the first time ever once a new standard for encoding biometric information is approved next year, DOD officials told the audience at the AFCEA Federal Identity Forum in Tampa, Florida, on Tuesday.

August 1, 2017
By Don Maclean

Cybersecurity is a human problem. Bad people use good technology for the worst purposes. Good people sometimes simply make mistakes or take inappropriate shortcuts. In the unfolding, complex cyber ecosystem, nowhere does human meet machine more directly than with identity and access management, or IAM.

Yet this direct connection is fraught with risk. Everyone must log in, but no one wants a lengthy process. Consequently, the more that IAM is automated, the more that people—who pose the weakest link in the cyber realm—are removed from the equation. Herein lies the problem: The easier processes become for users, the more complicated processes become for systems themselves.

August 1, 2017
By Sandra Jontz
A U.S. airman with the 81st Force Support Squadron resets her common access card (CAC) personal identification number. U.S. Air Force photo by Kemberly Groue

The Defense Information Systems Agency is dipping its toes into the huge pool of options for identity security to generate new approaches that go well beyond usernames and passwords. Hoping to roll out some solutions before the end of the fiscal year, the agency is weighing multifactor authentication, derived credentials and technologies to support mobile devices and rid its ranks of the common access card.

May 9, 2012
By Rita Boland

The U.S. Defense Department must move to a single identity management system, the department's chief information officer said today at the Defense Information Systems Agency (DISA) Mission Partner Conference. Teri Takai stated that enterprise email is a driver of that system but acknowledged that the bigger concern is the identity management rather than whether all the military services embrace the email migration. Despite arguments among members of a military chief information officer panel earlier in the day, Takai said she is glad the discussion came up because people need to understand that finding the right solution for identity management is difficult.

September 13, 2010
By George Seffers

Booz Allen Hamilton, Incorporated, Herndon, Virginia, was awarded a nearly $24 million contract for biometrics, identity management, and homeland security technologies research and analysis for Space and Naval Warfare Systems Center Atlantic. 55th Contracting Squadran, Offutt Air Force Base, Nebraska, is the contracting activity.

February 22, 2010
 

No, I'm not talking about the classic Marilyn Monroe film; I'm talking about AFCEA's Homeland Security Conference, going on this Wednesday and Thursday. The theme is "DHS: The 7-Year Itch-Renewing the Commitment." The event will cover such topics as cybersecurity, securing social media, transparency, identity management, information and intelligence sharing, and more. Speakers include Washington, D.C., Metropolitan Police Chief Cathy Lanier, Congresswoman Loretta Sanchez and W. Ralph Basham.

August 21, 2013
By Henry Kenyon

As a part of its ongoing efforts to protect critical national infrastructure, the Obama administration has been actively working on making government computer networks more robust and resistant to cyber attack. To do this, the White House has looked internally at federal agencies to put into place new metrics and policies to improve their security stance and externally, reaching out to foreign governments to set up international accords on cyber espionage, a top administration official said.