identity management | GovCIO Media & Research

identity management

CISO Lynette Sherrill outlines how the agency is using a zero trust mindset at the heart of the agency's cybersecurity approach.
Technology leaders across government gathered to discuss top IT modernization priorities during DOL’s Federal Tech Day, which included AI and cybersecurity.
Edge computing is vital to the warfighter but securing networks and enabling data access at the network edge remain difficult.
Health and civilian agencies see major benefits from ICAM solutions, a pillar of zero trust, when protecting IT systems from phishing scams and fraudsters.
Former HHS OIG CIO Gerald Caron takes on a new role as ITA CIO.
Agencies are bolstering workforce training and zero trust to secure the hybrid workplace.
CISA and GSA identity management leaders unpack new playbook.
The strategy lists secure, survive and strike as the primary principles for defense in cyberspace.
Ken Myers explains how GSA’s new playbooks are guiding federal agencies’ identity management.
Automation is a key driver for sustainable identity management and zero trust.
Army, GSA and VA leaders are improving identity management to secure critical employee and customer information.
Identity management, level of assurance and single source of truth are pillars of the zero trust approach to cybersecurity.
Many federal agencies are tackling identity, credential and access management solutions to help them in their new zero trust approach to security.
The Office of Justice Programs leveraged zero trust strategies as a pillar to modernize its grants management system.
CISA encourages all organizations to report immediately and maintain consistent communication until cyber incidents are resolved.
Defense officials described how zero trust, ICAM solutions, DevSecOps and common data standards will optimize JADC2 implementation.
The Department of the Army remains focused on identity and mobility within a zero trust environment as employees continue to telework.
Tackling identity management within a zero trust strategy requires a culture shift.
Cyber organizations are adopting zero trust and access management solutions to combat new ransomware threats.
The service's cyber chief says identity management is key to fulfilling a zero trust strategy.