"Accessing medical records [should be] as easy as accessing banking records today," says Farzad Mostashari, M.D., national coordinator for health IT, addressing a hearing on patient ID authentication.
Absent a uniform method, the NIST interagency report investigates credential revocation, focusing on identifying missing requirements, and suggests a model for credential reliability and revocation services that addresses those missing requirements.
Five pilot projects unveiled by the federal government, if successful, should build trust in online commerce, helping to boost the economy, says Jeremy Grant, head of the National Strategy for Trusted Identities in Cyberspace National Program office.
The new report aims to help access-control experts improve their evaluation of the highest security access-control systems by discussing the administration, enforcement, performance and support properties of mechanisms that are embedded in each system.
An advisory panel wants a multi-factor authentication requirement included in Stage 3 of the HITECH Act electronic health record program. Find out under what circumstances that requirement would apply.
Cloud computing and mobile technologies add new complexities to how we approach identity and access management. RSA CTO Sam Curry offers advice on overcoming the challenges.
The revision would require identity cards used by federal employees and contractors to contain an integrated circuit chip for storing electronic information, a personal identification number, a printed photograph and two electronically stored fingerprints.
The role of identity and access management is as critical as ever. But the demands of the role? They are radically different, says Sam Curry, CTO of RSA, who discusses the new skills needed.
The banking industry has never seen such a fundamental change as mobile banking. Globally, millions of consumers are already using a wide array of mobile devices to conduct banking - and millions more are expected to go mobile in the coming months.
But with that growth come a whole new set of threats: mobile...
Marcus Ranum isn't shy about saying online authentication methods are outdated and insecure. Passwords will get breached, but organizations can do more to protect their users and online databases.
With an increase in state-sponsored hacking, Google says it will alert a select subset of its Gmail e-mail users when it believes their accounts may have been targeted.
Information security professionals with ID and access management skills are in high demand because the growth in cloud computing and mobile technologies is creating new potential vulnerabilities.
President Obama backs $24.5 million in new funding for the National Strategy for Trusted Identities in Cyberspace, an initiative aimed to create a trusted, commercial ecosystem on the Internet.
Creating a more trusted Internet ecosystem should help all types of enterprises and leaders implement identity management solutions that extend beyond usernames and passwords, White House Cybersecurity Coordinator Howard Schmidt says.
Army Gen. Keith Alexander, the head of the U.S. military's Cyber Command and National Security Agency, paints a bleak picture with mounting challenges to the Defense Department's and nation's IT systems at a House hearing.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.