The fantasy of a single login with access to multiple public sector services isn’t so far-fetched, cybersecurity experts say.
Posts Tagged: identity
Identity and access management is essential to modern cybersecurity. As agencies transform their IT environments through the adoption of cloud solutions, they need to ensure they can easily manage which users have access to which applications and data
How exactly can an agency secure data with an emphasis on identity and access management? A panel at IBM’s ThinkGov centered on this question.
“You’ve been hacked.” That is the line that every person dreads waking up to in their inbox. But securing your identity and your privacy is no easy task. The government has been using identity and access management tools for years, commonly known as IAM. IAM uses a four part verification process that helps cut downRead… Read more »
At a recent panel meeting of the Armed Forces Communications and Electronics Association (AFCEA) about how federal agencies can best manage identities to improve engagement and relationships with those customers, an illustrative private sector example came to light. A member of the audience told the story of buying a Dell computer ten years ago, aRead… Read more »
As government managers write requirements for digital civic engagement, people need to consider how much of their identity they need to share to ensure accountability and trust in the system, while not discouraging civic participation. The explicit message of modern superhero stories is best summed up in Spiderman’s origin tale, “with great power comes greatRead… Read more »
Recently, I was asked to become a member of the program committee for the eID and ePassport Conference. A week and a half ago, we had our first meeting for the next edition of this conference, and it was decided that it would take place in Berlin on October 28th and 29th. The web siteRead… Read more »
It seems that most people these days understand what Identity Management it. For those that don’t, it describes the management of individual identifiers, their authentication, authorization and permissions within or across system and enterprise boundaries. In other words, who are you and what can you access, either physically or virtually. The goal of identity managementRead… Read more »
There was an article in Security Products recently that discussed Situational Awareness in a maritime environment. Due to the extreme number of ships both commercial and military that are on the seas at any one time, it is imperative that you have a way to quickly identify the target, assess the threat level, and actRead… Read more »
What would your agency do with $100 million dollars or even tens of thousands more? Agency funds are lost to fraud every day. The Fraud of the Day forum highlights real stories and what you need to know to help fight fraud. Visit the FraudoftheDay.com forum to learn more and sign up to receive dailyRead… Read more »