The topic has been discussed for years, but now truly is the time for organizations to invest in federated identity management.
So says Tom Smedinghoff, partner at Chicago-based law firm Wildman Harrold. In an exclusive interview, Smedinghoff discusses:
What's new about federated ID management;
Challenged to...
Interview with Tom Smedinghoff of Wildman Harrold
The topic has been discussed for years, but now truly is the time for organizations to invest in federated identity management.
So says Tom Smedinghoff, partner at Chicago-based law firm Wildman Harrold. In an exclusive interview, Smedinghoff discusses:
What's...
Although DHS has established an identification credentialing and issuance process, the department has not made the implementation of an effective HSPD-12 program a priority.
Protecting United States borders has always been a top priority. However, what is stated as a goal of halting illegal immigration has evolved to a focus on keeping potential terrorist threats out of the US.
Financial institutions must address a growing number of regulations designed to ensure the security, integrity and confidentiality of customer and corporate data . Regulations are often mandatory and compliance must be verifiable. In many cases, organizations and their company officers found to be non-compliant may be...
It is time to address the issue of protecting our identity and thanks to the federal government's implementation of PIV smart card credentials; we have a proven technology in place that could be leveraged for a much broader audience.
Citizens have a heightened expectation of privacy when they interact with the government online, says Heather West, a CDT policy analyst with the advocacy group Center for Democracy and Technology.
As the federal government begins to pilot the use of third-party credentials to authenticate users at three websites, the advocacy group Center for Democracy and Technology this month has published a white paper, Issues for Responsible User-Centric Identity, raising questions it feels must be addressed before...
This application will let Navy personnel post ideas in the form of a blog and invite participation from other users no matter their position within the organization or their geographical location, Carey said.
The landscape of hackers is filled with stories from those whose job is to hunt them down. SANS forensics instructor, Rob Lee, also a senior forensics consultant at the IT security consultancy Mandiant shares three "villain" examples of the types of attacks being seen in the field by the company's forensic...
The National Institute of Standards and Technology released Wednesday a new draft of the document Secure Domain Name System Deployment Guide, or Special Publication 800-81.
NIST says this revision addresses feedback received for the first revision through public comments in March, in addition to adding three new...
Identity theft is a growing concern for governments, businesses and citizens alike. "We're in the middle of a national identity crisis," says Neville Pattinson, VP of Government Affairs & Standards, NA., Gemalto. In an exclusive interview, Pattinson discusses:
The case for credentialing;
Practical applications of...
Identity theft is a growing concern for governments, businesses and citizens alike. "We're in the middle of a national identity crisis," says Neville Pattinson, VP of Government Affairs & Standards, NA., Gemalto. In an exclusive interview, Pattinson discusses:
The case for credentialing;
Practical applications of...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.