Traditional identity verification methods have become less effective, and they’re exposing organizations to dangerous cyberattacks. But a risk management approach that includes multi-factor authentication, among other tools, can safeguard agency networks and data.
Posts Tagged: Identity Management
During a recent webinar, government and industry leaders discussed key steps agencies can take to implementing identity-centric security.
Beyond authenticating humans, these teams now realize they must also manage the identities of countless machines like systems, applications and devices.
A user-focused modernization project not only ensures that new technologies meet stakeholder needs; it also illuminates a new tactic for increasing security. By using the identity of individual users – whether employees, citizens or other agencies – organizations can adopt new technologies that transcend the traditional perimeters of data centers.
State and local governments are turning their attention toward identity management, to ensure that critical organization data can only be accessed by the right people, at the right time and for the right reasons. But good identity management is easier said than done.
This interview is an excerpt from our recent guide, The Future of Cybersecurity, which examines 15 trends transforming the way government safeguards information and technology. “Security is all about trust,” said Richard Breakiron, Senior Director of Cyber Solutions of ViON, an information technology enterprise solutions provider. But how do you create that trust in theRead… Read more »
Written in collaboration with Kolin Whitley, Director of Fraud and Identity Solutions, Experian Public Sector Picture a novice internet user logging on to a government portal for the first time. He’s using a desktop computer, and the process takes him a few minutes because he isn’t very tech-savvy. He also doesn’t have any details fromRead… Read more »
So far in this series, I’ve written about mobile technology, connected sensors, 3D Printing (which I called Products-on-Demand or PonD), and Advanced Sharing. Each of these is important, but the capstone, what will act as a force-multiplier for each, is a better understanding of and method for identity management. Think about an average week forRead… Read more »