Identity

How to Make Unemployment Insurance Work for Gig Workers

The share of workers who have traditional full-time jobs is shrinking but the ways to verify identity and income have not kept up.

The Taliban Reportedly Have Control of US Biometric Devices – a Lesson in Life-and-Death Consequences of Data Privacy

The Defense Department viewed “identity dominance” as the cornerstone of multiple counterterrorism strategies.

Expired Driver’s Licenses Open Lane for Cybercriminals

Fraudsters send out texts or emails falsely warning that the target’s license needs to be updated, is missing information or is expiring.

US, UK Officials: Russian Military Leveraging Containers in Active Hacking Campaign

Cybersecurity agencies issued an advisory with indicators of compromise and mitigation measures. 

People Don't Realize They're Data Breach Victims

The researchers found participants were not aware of 74% of the breaches.

Ransomware, Data Breach, Cyberattack: What Do They Have to Do with Your Personal Information, and How Worried Should You Be?

Even if your data has not been exposed yet, why not take the time now to protect yourself?

What I Learned Helping Lead Oversight of $5 Trillion in Pandemic Relief

Large scale identity theft-based fraud in unemployment assistance stunned many, even those who fight fraud for a living.

Survey: Government Faces Increasing Threat from Stolen Accounts

But agencies may not be taking the right steps to mitigate the account takeovers.

Reimagining Access to Services with Government-to-Citizen Identity

With the traditional perimeter gone, identity management is the new boundary.

Demystifying Access Control and Zero Trust

As agencies rethink making temporary remote arrangements permanent, officials should start with proven ubiquitous encryption technology.

Zero Trust or Bust

One primary consideration should drive implementation: who gets to see what content? 

Single Sign-in For Government Services Expands to States, Localities

The federal government is looking to partner with state and local governments to grow its Login.gov service, which it says is secure and user friendly.

Army Wants to Automate Base Access With Facial Recognition at Drive-Thru Checkpoints

The proposed system uses a reliable form of facial biometric identification but would need to control for variables like weather and low light.

Air Force Working on Foundational Zero Trust Activities, CIO Says

Some programs are already operating under a zero trust framework, but the enterprise as a whole still needs basic tools for things like identity, credentials and access management.