Digital Government

GSA to Verify Identities of Some SAM Users After Transition

The agency will require identity proofing for SAM registrants after the big migration to beta.SAM.gov in May.

Ideas

A New Administration Offers an Ideal Time to Prevent Entitlement Creep

Here’s what you need to know to protect federal employees and secure classified data.

Cybersecurity

DOD Shares Details on Zero Trust Architecture Timeline

The draft of the cybersecurity-focused document was completed in October and is going through a content review, assessment and approval process.

Ideas

How Government Agencies Can Use Tech to Safely Get Back to Their Workplaces

Now is the time to prioritize collaboration between the IT, physical security and human resources teams.

Modernization

GSA Preparing Switch to eSignature for Multiple Award Schedule Offers and Modifications

Contract holders will also see new security measures being implemented in the near future for eOffer and eMod.

Ideas

ICAM, CDM Put Identity-Based Security Front and Center

Agencies must be able to identify, monitor and manage all people, applications and devices that access government resources.

Digital Government

DISA’s Enterprise Identity Management Solution Targeted for Testing with Pilot Apps in January

The new enterprise identity, credential, and access management solution will support a shift to a zero trust architecture, Defense Information Systems Agency officials said.

Ideas

The Path Toward a Holistic Zero Trust Architecture

The Defense Department's anticipated guidelines should inspire more organizations to follow such a model, moving zero trust from a buzzword to reality. 

Modernization

Bipartisan House Bill Targets Improving Digital Identity Verification

Lawmakers aim to help confront and curb identity theft through strategic modernization.

Emerging Tech

IRS Wants to Be Able to Trace ‘Untraceable’ Digital Currencies

The agency’s criminal investigation group is increasingly encountering anonymous and privacy-focused online payments methods.

Ideas

How to Head Off Public Assistance Fraud Before Dollars Go Out the Door

Opting to chase and recover money fraudsters steal from government agencies is not a sustainable strategy.

Modernization

Technology Transformation Acting Director Talks Service’s Business Model and Future

Bob De Luca, the acting director of GSA’s Technology Transformation Service joins Nextgov to talk about how the program stays competitive, lessons from COVID-19 and what the next director needs to know.

Emerging Tech

TSA’s Looking to Rapidly Verify Passengers Without Biometrics or Physical IDs

Prior to the pandemic, hundreds of travelers would attempt to pass through security checkpoints each day without identification.

Cybersecurity

DISA to Release Zero-Trust Model This Year

Vice Adm. Nancy Norton said the Defense Department must take a data-centric approach to protecting its networks.

Ideas

Preventing Cyberattacks in Government Supply Chains

Stolen credentials remain the No. 1 hacking tactic used by malicious actors to gain access to “secure” networks and wreak havoc within organizations—and potentially up the supply chain.  

Ideas

Why Government Needs to Move Quickly to Zero Trust

Most experts agree that the best path forward would be zero-trust networking, although the concept is defined differently depending on who you happen to ask.

Ideas

Amid COVID-19, Government Seeks Virtual Summer Interns

Virtual internships with the government are a possibility for students.

Cybersecurity

Social Security Wants a New Way to Manage Access for 330 Million Americans

The agency is considering overhauling its identity credential and access management, or ICAM, system to manage secure access for all users.

Ideas

Managing User Access Is a Crucial Step in Securing Federal Organizations

Agencies must make sure they leave no security gaps when employees join or leave.

Cybersecurity

Government’s Annual Cyber Report Shows Improvements Across the Board

Agencies received lower scores for not holding contractors responsible for privacy requirements.