IoT provides a number of potential benefits for the federal space, but risks remain. There’s a long road ahead, but with stronger authentication methods, education and industry collaboration, the federal government could thrive in the IoT revolution.
Posts Tagged: authentication
The proliferation of access points has added to the problem of keeping information safe. Now data is being accessed from remote work centers and employees’ homes or positions in the field, plus mobile devices and more. Here are four main access points to watch out for.
At Tuesday’s GovLoop event, “Evolving Tactics to Combat the Cyber Threat,” govies kicked off the day by focusing on a critical strategy to better tackle cyber threats: interagency collaboration. Michael Garcia is the Acting Director of the National Strategy for Trusted Identities in Cyberspace (NSTIC) at the National Institute for Standards and Technology (NIST) under... Read more »
There was an article in Security Products recently that discussed Situational Awareness in a maritime environment. Due to the extreme number of ships both commercial and military that are on the seas at any one time, it is imperative that you have a way to quickly identify the target, assess the threat level, and act... Read more »
The future of the internet will involve more authentication than it does today but there might be a simple interim solution to provide some level of authentication for the Gov 2.0 presence on online social networks such as facebook and twitter. A standard policy of having a reciprocal link back to a facebook fan page... Read more »