Identity

Securing Space: The Next Frontier of Credential-Based Attacks

Like many other sectors, the space industry needs to secure its supply chain from start to finish.

GSA to Verify Identities of Some SAM Users After Transition

The agency will require identity proofing for SAM registrants after the big migration to beta.SAM.gov in May.

A New Administration Offers an Ideal Time to Prevent Entitlement Creep

Here’s what you need to know to protect federal employees and secure classified data.

DOD Shares Details on Zero Trust Architecture Timeline

The draft of the cybersecurity-focused document was completed in October and is going through a content review, assessment and approval process.

How Government Agencies Can Use Tech to Safely Get Back to Their Workplaces

Now is the time to prioritize collaboration between the IT, physical security and human resources teams.

GSA Preparing Switch to eSignature for Multiple Award Schedule Offers and Modifications

Contract holders will also see new security measures being implemented in the near future for eOffer and eMod.

ICAM, CDM Put Identity-Based Security Front and Center

Agencies must be able to identify, monitor and manage all people, applications and devices that access government resources.

DISA’s Enterprise Identity Management Solution Targeted for Testing with Pilot Apps in January

The new enterprise identity, credential, and access management solution will support a shift to a zero trust architecture, Defense Information Systems Agency officials said.

The Path Toward a Holistic Zero Trust Architecture

The Defense Department's anticipated guidelines should inspire more organizations to follow such a model, moving zero trust from a buzzword to reality. 

Bipartisan House Bill Targets Improving Digital Identity Verification

Lawmakers aim to help confront and curb identity theft through strategic modernization.

IRS Wants to Be Able to Trace ‘Untraceable’ Digital Currencies

The agency’s criminal investigation group is increasingly encountering anonymous and privacy-focused online payments methods.

How to Head Off Public Assistance Fraud Before Dollars Go Out the Door

Opting to chase and recover money fraudsters steal from government agencies is not a sustainable strategy.

Technology Transformation Acting Director Talks Service’s Business Model and Future

Bob De Luca, the acting director of GSA’s Technology Transformation Service joins Nextgov to talk about how the program stays competitive, lessons from COVID-19 and what the next director needs to know.

TSA’s Looking to Rapidly Verify Passengers Without Biometrics or Physical IDs

Prior to the pandemic, hundreds of travelers would attempt to pass through security checkpoints each day without identification.

DISA to Release Zero-Trust Model This Year

Vice Adm. Nancy Norton said the Defense Department must take a data-centric approach to protecting its networks.

Preventing Cyberattacks in Government Supply Chains

Stolen credentials remain the No. 1 hacking tactic used by malicious actors to gain access to “secure” networks and wreak havoc within organizations—and potentially up the supply chain.  

Why Government Needs to Move Quickly to Zero Trust

Most experts agree that the best path forward would be zero-trust networking, although the concept is defined differently depending on who you happen to ask.