NIST Expert Talks Benefits, Challenges of Identity and Access Management
A Senior Policy Adviser at NIST’s Trusted Identities Group shared government trends and what identity and access management means for everyday employees.
A Senior Policy Adviser at NIST’s Trusted Identities Group shared government trends and what identity and access management means for everyday employees.
Martin Stanley, Senior Advisor for AI in the Office of the Chief Technology Officer at DHS, shares how his agency uses AI to combat cyberattacks.
Agencies today are looking to better reach citizens and improve internal processes, all while staying ahead of modern threats. But as agencies focus on these efforts, they must be mindful of mitigating dangers to their data.
Identity and access management (IAM) is not just about doing security to comply with government requirements. Instead, it’s a means to ensure the consistency and trustworthiness of government services, especially as digital options expand.
Test for your agency’s threat intelligence maturity to find out its strengths and weaknesses, and how to work toward fully integrated threat intelligence.
It can be scary to think about open access to your vendors’ sensitive personal information. Get training, train your staff and even other internal employees that submit vendor documentation to you.
IT controls consist of the procedures and policies that help ensure that technologies are being used for their intended purposes in a reasonable manner.
The Trusted Internet Connections (TIC) program launched in 2007 to protect the security of federal network connections governmentwide.
These numbers illustrate the growth of DevSecOps and set the context for why this practice is important for governments at all levels to implement.
Three key steps agencies should take to improve the management of their data centers and improve their FITARA grade.