identity management | GovernmentCIO Media & Research

identity management

Health and civilian agencies see major benefits from ICAM solutions, a pillar of zero trust, when protecting IT systems from phishing scams and fraudsters.
Former HHS OIG CIO Gerald Caron takes on a new role as ITA CIO.
Agencies are bolstering workforce training and zero trust to secure the hybrid workplace.
CISA and GSA identity management leaders unpack new playbook.
The strategy lists secure, survive and strike as the primary principles for defense in cyberspace.
Ken Myers explains how GSA’s new playbooks are guiding federal agencies’ identity management.
Automation is a key driver for sustainable identity management and zero trust.
Army, GSA and VA leaders are improving identity management to secure critical employee and customer information.
Identity management, level of assurance and single source of truth are pillars of the zero trust approach to cybersecurity.
Many federal agencies are tackling identity, credential and access management solutions to help them in their new zero trust approach to security.
The Office of Justice Programs leveraged zero trust strategies as a pillar to modernize its grants management system.
CISA encourages all organizations to report immediately and maintain consistent communication until cyber incidents are resolved.
Defense officials described how zero trust, ICAM solutions, DevSecOps and common data standards will optimize JADC2 implementation.
The Department of the Army remains focused on identity and mobility within a zero trust environment as employees continue to telework.
Tackling identity management within a zero trust strategy requires a culture shift.
Cyber organizations are adopting zero trust and access management solutions to combat new ransomware threats.
The service's cyber chief says identity management is key to fulfilling a zero trust strategy.
Audits and evaluations are helping the agency detect and prevent identity fraud.
TSA and CBP pilot facial-recognition programs with an eye on security and privacy.
GSA's approach to managing passwords resembles shared services.