It is time to address the issue of protecting our identity and thanks to the federal government's implementation of PIV smart card credentials; we have a proven technology in place that could be leveraged for a much broader audience.
What will be the hottest skills and competencies within information security in 2010?
Application security and biometrics are among the in-demand skills, according to the latest quarterly published list of the 2009 IT Skills Pay and Demand Trends Report by Foote Partners, LLC.
After fingerprints, iris recognition is the second most supported biometric characteristic, and its popularity as a means of authentication is growing.
Patrick Grother is among the computer scientists at the National Institute of Standards and Technology's Information Technology Laboratory who are collaborating...
Army Biometrics Taskforce Director Myra Gray sees biometrics as the best identifier of individuals but shouldn't be employed alone as means to shield people's identities from those who would cause harm.
The same biometric tool to identify a friend or foe in combat can be repurposed back in the states to help secure military installations, says Biometrics Task Force Assistant Director Lisa Smith.
Interview with Myra Gray, Director, U.S. Army Biometrics Task Force
Though fingerprint and iris scans have advantages over passwords and magnetic identity cards as a means to grant access to IT systems, in many instances, the biometric technologies aren't ready to be employed alone, says Myra Gray, director of the...
Interview with Lisa SwanDeputy DirectorBiometrics Task Force, U.S. Army
American combat forces deployed in Afghanistan and Iraq employ biometrics to tell our friends from insurgents and terrorists. Back home, the Defense Department uses similar fingerprint, iris and facial recognition tools to manage access to...
The proliferation of smaller devices including advanced personal digital assistants, ultra-portable personal computers and high-speed cellular networks has made portable biometric systems a reality.
Information security - it's now a major national priority, and it's also the subject of a new Master's of Science program at East Stroudsburg University. This unique, online graduate program debuts on Aug. 31, and in an exclusive interview ESU professor N. Paul Schembari discusses:
The program's unique...
The National Cryptologic Museum (NCM) is the National Security Agency's principal gateway to the public, opening its doors in December 1993. Located adjacent to NSA Headquarters in Ft. George G. Meade, MD., the museum houses thousands of artifacts that collectively serve to sustain the history of the cryptologic...
As companies grow, the increase in employees can pose a serious concern, as security personnel are employed to help ensure the safety of employees. There are numerous measures that can be taken to improve physical security, and their cost-effectiveness should be considered before installation. Some methods of...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.