A staggering amount of sensitive information, from personnel reviews to contracts and medical records, traverses the federal government’s computer network. Integral to this information-sharing process ...
Team Awareness Kit (TAK) and its Android variant, the Android Tactical Assault Kit (ATAK), are situational awareness ...
BALTIMORE – Defense agencies could see a slew of new capabilities designed to ease identity and access management this year, according to defense IT officials. Chief among them is an expansion of ...
Phil Goldstein is a former web editor of the CDW family of tech magazines and a veteran technology journalist. He lives in Washington, D.C., with his wife and their animals: a dog named Brenna, and ...
MOUNTAIN VIEW, CA--(Marketwired - Nov 17, 2016) - Authentic8, maker of Silo, the secure, virtual browser now supports certificates stored on government-issued Common Access Cards, or CACs. This comes ...
Strong authentication remains a cybersecurity priority under the Office of Management and Budget’s (OMB) cross-agency priority goals that were announced in the 2015 federal budget. In its 2015 budget ...
The Common Access Card (CAC) has been the backbone of identity verification and secure access for U.S. federal systems for over two decades. Introduced by ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results