Remove Authentication Remove Government Remove Network Remove Systems Administration
article thumbnail

Fed Tech News Roundup 8 July 2015

CTOvision

The Army, therefore, is planning to further incorporate the open VICTORY network development standard. However, more recent network information going back to late May could be. Privileged user authentication and PKI are. Marine Corps, Interior Dept. But can it budge the behemoth federal bureaucracy? LATEST NEWS.

Insurance 150
article thumbnail

Insider Threat: A perspective on how to address the increasing risk

CTOvision

However, in June of 2013, a systems administrator at the National Security Agency (NSA) reminded us of the threat that already exists within an organization, behind the protection of its sophisticated, complex perimeter security. The potential for damage from the insider threat is serious across Commercial and Federal Sectors alike.

How To 150
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Averting turbulence in the air

CIO Business Intelligence

As a result, PCI DSS has become a pivotal framework for the airline industry with its invaluable agenda to govern the PCI DSS for payment card transactions. These IT systems are also shared among many other airlines, and it could be challenging to properly maintain the level of security of this shared infrastructure.

article thumbnail

The Architecture of Identity Systems

Phil Windley

This question of power and authority is vital in identity systems. We can ask "what do we give up and to whom in a given identity system?" I argued that the architecture of SSI, its structure, made those relationships more authentic. the right and acceptance of an authority, usually a governing law or a regime.

article thumbnail

10 Unbelievable Ways the CIA Is Failing at Cybersecurity

SecureWorld News

The CIA's Center for Cyber Intelligence (CCI) operates a development network where it creates and validates secret cyber weapons the United States uses against its adversaries. And this network appears to be a key source of WikiLeaks documents, for the following 10 reasons: 1. Day-to-day security practices had become woefully lax.".

article thumbnail

Life-Like Identity: Why the Internet Needs an Identity Metasystem

Phil Windley

Because DIDs are cryptographic artifacts tied to public-private key pairs, this exchange provides the agents with the means to perform mutual authentication and create an encrypted channel. This level of trust is provided by Layer 4 in Figure 1, context-specific governance and trust frameworks. A Universal Trust Framework.

Internet 102