Tag Results

Tag Results for: Identity Management
CHIPS Articles
Thursday, November 3, 2016
“Anyone trying to secure their networks must have some kind of hunt capability,” said John Hickey, cyber development ...
Thursday, April 17, 2014
Under the DON ESL IT Efficiencies initiative, the Department of the Navy Enterprise Software Licensing ActivIdentity Blanket ...
TAGS: ELA, ESI, IDManagement, NEN
April-June 2015 Issue
The Department of the Navy (DON) ActivIdentity Enterprise Software License (ESL) Agreement is saving millions of dollars ...
Thursday, October 10, 2019
October is not all skeletons and jack-o-lanterns; there are also scary things that live in cyberspace. October is National ...
Wednesday, August 7, 2019
ABERDEEN PROVING GROUND, Md. -- The Army Futures Command, or AFC, is developing wearable identity authentication and ...
Wednesday, September 25, 2019
No matter how secure a computer network or the environment it's used in may seem to be, users should just assume ...
Friday, May 24, 2019
The National Institute of Standards and Technology announces the publication of Special Publication (SP) 800-57 Part 2 ...
January-March 2016 Issue
From novice hackers to nation-state actors, Department of Defense (DoD) information systems and networks continue to face a ...
Wednesday, November 5, 2014
WASHINGTON (NNS) -- Starting in January, Defense Department government travel card holders will begin receiving new ...
July-September 2015 Issue
<a href="http://www.secnav.navy.mil/donhr/About/Senior-Executives/Biographies/Page,%20C.pdf" alt='Link will ...
July-September 2014 Issue
The Deputy Chief of Naval Operations for Information Dominance (N2/N6) is the Navy's lead office for resourcing ...
January-March 2002 Issue
The Department of Defense (DoD) Common Access Card won a Government Technology Leadership Award on December 4, 2001. This ...
January-March 2002 Issue
From the invention of underwater warfare to the modern anti-missile defense technology of today's warfighter, the ...
Monday, May 7, 2018
WASHINGTON -- <a href="http://www.stratcom.mil/Media/Factsheets/Factsheet.../us-cyber-command-uscybercom/" ...
July-September 2014 Issue
<a href=" http://www.secnav.navy.mil/donhr/About/Senior-Executives/Biographies/Sawyer,%20D.pdf" alt='Link will ...
Yesterday, November 20, 2019
The <a href="https://www.dc3.mil/" alt='Link will open in a new window.' ...
Wednesday, September 30, 2015
WASHINGTON, September 29, 2015 — Defense and deterrence are two of the highest priorities for bolstering the nation’s ...
July-September 2015 Issue
In 2008 the Department of Defense directed the services and other DoD agencies to reduce or eliminate the use of the SSN ...
April-June 2010 Issue
The Secretary of Defense has embraced public key cryptography as a critical component of defense-in-depth and contributor to ...
Wednesday, September 14, 2016
This <a ...
Tuesday, July 10, 2018
The Defense Information Systems Agency awarded an Other Transaction Agreement (OTA) for $49 million to Enterprise, LLC of ...
Friday, May 17, 2019
The Department of Defense has explored alternatives for authenticating and verifying user access to its information systems ...
Wednesday, October 30, 2019
Greetings friends, colleagues and mission partners! I am thankful for the opportunity to work with and for each of you, ...
Tuesday, May 21, 2019
“Public Key Infrastructure (PKI) has emerged as the foundation to provide secure data transmission and internet security,” ...
Tuesday, June 5, 2018
The federal government’s new system for background investigations made its first public appearance at the Armed Forces ...
Wednesday, August 21, 2019
The Defense Information Systems Agency’s assured identity initiative, which focuses on advancing how federal agencies ...
July-September 2016 Issue
On Aug. 18, the Department of Defense Chief Information Officer Terry Halvorsen launched a valiant new plan for DoD IT ...
January-March 2017 Issue
<a href="http://www.defense.gov/About-DoD/Biographies/Biography-View/Article/602710" alt='Link will open in ...
April-June 2002 Issue
On January 23, 2002 the Department of Defense (DoD) Common Access Card program received an the DoD Best Practice Award, ...
Wednesday, January 2, 2019
DoD is required to use strong authentication credentials for network and IT system access, and the Common Access Card (CAC) ...
Wednesday, September 18, 2019
<div style="border: solid 0px #808080; padding: 15px;"> <font color="#00008B" ...
January-March 2016 Issue
Efforts to upgrade from the use of the Secure Hash Algorithm (SHA)-1 standard, to SHA-256 are well underway by information ...
April-June 2016 Issue
WASHINGTON (NNS) -- Department of the Navy Chief Information Officer (DON CIO) Robert Foster recognized more than 10 ...
April-June 2004 Issue
Mr. Dave Wennergren, DON CIO, was recently named Chair of the new Department of Defense (DoD) Identity Management Senior ...
July-September 2016 Issue
Remember Clinger-Cohen and the original Federal Information Security Management Act (FISMA), when it was called the ...
Monday, February 1, 2016
Registration is open for the DON IT Conference, West Coast 2016, until February 5. It has been approved for February 17-18, ...
April-June 2019 Issue
The conference schedule is now available for the DON IT Conference, East Coast 2019. It has been approved for June 3-5, ...
April-June 2018 Issue
Department of the Navy information management and information technology professionals gathered together to learn about the ...
July-September 2019 Issue
Dr. Ray A. Letteer is the Deputy Branch Head, Compliance Branch, Cybersecurity Section of the Command, Control, ...
Tuesday, March 28, 2017
WASHINGTON (AFNS) -- Today’s environment is filled with examples of technology designed to connect Airmen to the internet: ...
January-March 2011 Issue
How do thieves steal an identity? Identity theft starts with the misuse of an individual's personally identifiable ...
Tuesday, October 4, 2016
Earlier this year, the Administration announced a series of policy decisions to streamline and enhance how the Federal ...
Thursday, September 5, 2013
The National Institute of Standards and Technology (NIST) has issued an updated version of the standard specification ...
TAGS: CAC, IDManagement
January-March 2019 Issue
SAN DIEGO (NNS) – Capt. Kris Kearton, Director of U.S. Fleet Cyber Command's Office of Compliance and Assessment, spoke ...
January-March 2011 Issue
The Navy Marine Corps Intranet (NMCI) began as a revolutionary idea more than 10 years ago when the question was posed: What ...
Tuesday, September 30, 2014
Seeking to expand the nation’s capability to detect and identify materials that are not easily visualized by conventional ...
Friday, September 4, 2015
Quickly moving through security checkpoints by showing your hand to a scanner seems straight out of science fiction, but the ...
Wednesday, May 9, 2018
The terms Cyber Security, Cyber Space, and Cyber Domain are prevalent in all major news outlets and within the conference ...
April-June 2008 Issue
All Department of the Navy personnel should continue to increase their level of awareness about properly safeguarding ...
October-December 2009 Issue
The following is a recently reported compromise of personally identifiable information (PII) involving the theft of storage ...
October-December 2006 Issue
October 2006 marked the implementation date for issuing federal identification credentials in accordance with the Homeland ...
January-March 2016 Issue
The theft of Personally Identifiable Information (PII) from major retailers, financial institutions and the Federal ...
April-June 2018 Issue
By some accounts, Russian meddling in the US election system may have originated from the depths of a hot dog cart. It’s a ...
Thursday, November 14, 2019
The National Institute of Standards and Technology hopes to dispel some of the myths surrounding data security and access ...
January-March 2010 Issue
The December 2008 report written by the Center for Strategic and International Studies (CSIS) Commission on Cybersecurity ...
October-December 2004 Issue
Identity theft occurs when a person illegally obtains another person's name; Social Security Number; bank or credit card ...
January-March 2016 Issue
LT John Smith looked up from his iPhone, his eyes wide with shock. He looked quickly to his left and right, checking to see ...
April-June 2005 Issue
Mentoring young professionals and guiding and inspiring the workforce is a top priority for the Navy-Marine Corps leadership ...
April-June 2007 Issue
The Department of Defense (DoD) is modifying the current Common Access Card (CAC) to meet the mandates of Homeland Security ...
Thursday, June 21, 2018
Greetings! <p>Last month DISA hosted the Armed Forces Communications and Electronics Association’s Defensive Cyber ...
Wednesday, May 22, 2019
MARINE CORPS BASE QUANTICO, Virginia -- Marine Corps Systems Command sent a group of Marines and civilians to rural Indiana ...
April-June 2005 Issue
We live in a networked world, and a networked Navy-Marine Corps team has become a reality. Information sharing with ...
Tuesday, September 8, 2015
The National Counterintelligence and Security Center and Office of Personnel Management are urging those personnel impacted ...
Tuesday, May 1, 2018
SAN DIEGO – Naval Computer and Telecommunications Station San Diego (NCTS SD) held a change of command ceremony aboard Naval ...
October-December 2014 Issue
SUFFOLK, Va. (Oct. 1, 2014) –Navy Information Dominance Forces (NAVIDFOR) Command stood up today as the U.S. Navy’s newest ...
Wednesday, May 1, 2019
NATIONAL HARBOR, Md. (NNS) -- Eleven commands from across the Navy’s Information Warfare (IW) community will come together ...
Monday, September 15, 2014
<a href="http://www.secnav.navy.mil/donhr/About/Senior-Executives/Biographies/Sawyer,%20D.pdf" alt='Link will ...
Monday, August 17, 2015
The National Cybersecurity Center of Excellence (NCCoE) is seeking collaborators to provide products and technical expertise ...
Tuesday, September 8, 2015
<a href="http://www.navy.mil/docs/ALNAV-072-15.pdf" alt='Link will open in a new window.' target='whole'> ...
July-September 2005 Issue
<b>Active Duty Alert Helps Combat Identity Theft</b> <p>Identity theft is a growing crime in the United ...
October-December 2002 Issue
If you want to cross the quarterdeck of Navy hospital ship USNS COMFORT (T-AH 20), you'll need a new article of ...
Thursday, October 10, 2019
The National Institute of Standards and Technology Special Publication (SP) 800-57 Part 1 Revision 5, Recommendation for Key ...
Thursday, January 28, 2016
NIST announces the final release of <a href="http://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8055.pdf" ...
Friday, April 1, 2016
The National Institute of Standards and Technology (NIST) has released the final version of a document outlining its process ...
Friday, June 23, 2017
NIST has finalized <a href="http://csrc.nist.gov/publications/PubsSPs.html#SP-800-63-3" alt='Link will open ...
Thursday, May 31, 2018
Experts at recognizing faces often play a crucial role in criminal cases. A photo from a security camera can mean prison or ...
Thursday, March 7, 2019
In person registration closed on March 4, 2019 for the NIST Threshold Cryptography Workshop but NIST is <a href=" ...
Thursday, January 16, 2014
By adapting superconducting technology used in advanced telescope cameras, researchers at the National Institute of ...
Friday, June 19, 2015
The National Institute of Standards and Technology (NIST) has updated its technical specifications and guidance for the next ...
July-September 2001 Issue
<i>Connecting Technology (CT) Spring 2001, May 15-17, 2001 had the honor and pleasure to have Mr. Joseph Cipriano, ...
Monday, July 13, 2015
WASHINGTON, July 10, 2015 – U.S. Office of Personnel Management officials yesterday announced the results of the interagency ...
Thursday, June 25, 2015
The recent intrusions into U.S. Office of Personnel Management (OPM) systems that house personnel and background ...
Friday, July 10, 2015
<table width="100%" border="0" cellspacing="0" ...
Tuesday, June 16, 2015
A data breach at the Office of Personnel Management (OPM) — and you’re a current or former federal employee whose personal ...
Monday, June 29, 2015
There are two OPM data breach incidents. <p>OPM became aware of the first incident on April 2015 of the ...
Tuesday, July 14, 2015
The Office of Personnel Management cybersecurity resource center is located at <a ...
July-September 2015 Issue
WASHINGTON, D.C. – The U.S. Office of Personnel Management (OPM) and the U.S. Department of Defense (DoD) today announced ...
Tuesday, October 24, 2017
WASHINGTON -- The Army Cyber Command is recruiting a variety of cybersecurity talent from industry, government and academia ...
Tuesday, September 29, 2015
The U.S. Department of Commerce's National Institute of Standards and Technology (NIST) announced Sept. 21 that it will ...
July-September 2016 Issue
<strong><em>Introduction</strong><br/> For the CHIPS July-September privacy theme edition, the DON ...
July-September 2019 Issue
-- Develop and maintain an engaged and capable workforce. <p>-- Deliver an enhanced and positive customer experience. ...
January-March 2015 Issue
Marine Corps Forces Cyber Command (MARFORCYBER) faces a big challenge often experienced by other cyber agencies — achieving ...
April-June 2016 Issue
The Department of Defense introduced the concept of the Joint Information Environment (JIE) to enable a secure information ...
Tuesday, October 3, 2017
Rear Adm. Nancy Norton, vice director of the Defense Information Systems Agency, <a ...
Wednesday, October 28, 2015
<strong>When Information Is Lost or Exposed</strong> <p>Did you recently get a notice that says your ...
October-December 2015 Issue
Registration is now open for the DON IT Conference, West Coast 2016. It has been approved for February 17-18, 2016, and will ...
October-December 2018 Issue
Registration is now open for the DON IT Conference, West Coast 2019. It has been approved for February 13-15, 2019, and will ...
January-March 2017 Issue
The privacy of an individual is a fundamental right that must be respected and protected. While improved handling and ...
July-September 2016 Issue
This Privacy Tip provides guidance regarding the reproduction (copy, scan, or other means) of CAC and military ...
Friday, July 19, 2019
The National Cybersecurity Center of Excellence (NCCoE) released a draft Cybersecurity Practice Guide for public comment: ...
Wednesday, September 14, 2016
WASHINGTON, Sept. 13, 2016 — The Defense Department supports strong encryption to protect military capabilities and ...
July-September 2016 Issue
I want to update you on what the Department of the Navy is doing to protect sensitive personal data from compromise. As you ...
January-March 2017 Issue
The threat of tax return identity theft remains a growing problem. Learn the signs of potential fraudulent activity, how to ...
October-December 2018 Issue
<strong>The Navy Approach to Insider Threat</strong> <p>Since the days of the Chelsea Manning and ...
Monday, October 21, 2019
WASHINGTON (NNS) (NNS) -- Cyber threats against federal agencies, including across the Department of Defense and the U.S. ...
October-December 2019 Issue
When we consider cybersecurity threats and vulnerabilities, we often think of external actors. Indeed, external actors work ...
October-December 2016 Issue
As you might imagine, Marine Corps C4 has a substantial to-do list to expand information technology connectivity for ...
Wednesday, September 14, 2016
WASHINGTON, Sept. 13, 2016 — Transparency and intelligence seem like mutually exclusive terms, but they are not, the ...
Wednesday, April 20, 2016
PENSACOLA, Fla. (NNS) -- Two new mobile apps designed for Sailors to complete required Navy General Military Training (GMT) ...
Wednesday, July 10, 2019
Traditional identity management has typically involved storing user credentials, such as username-password combinations, in ...
July-September 2015 Issue
We've all heard the warnings about identity theft. We've been briefed on what to look for. Check your credit reports, check ...
July-September 2016 Issue
A few weeks ago an unknown person walked into a mobile phone store, claimed to be me, asked to upgrade my mobile phones, and ...
Sort By

CHIPS is an official U.S. Navy website sponsored by the Department of the Navy (DON) Chief Information Officer, the Department of Defense Enterprise Software Initiative (ESI) and the DON's ESI Software Product Manager Team at Space and Naval Warfare Systems Center Pacific.

Online ISSN 2154-1779; Print ISSN 1047-9988
Hyperlink Disclaimer