identity and access management (IAM)

There's 'no going back' to pre-pandemic business, NASCIO says

by • 2 weeks ago

Remote work and citizens' increased expectation of digital government are here to stay, according to NASCIO's annual survey of its members.

Identity is 'critical' for digital transformation, Arizona strategy chief says

by • 1 month ago

Arizona Chief Strategy Officer Doug Lange said that user identity management has been a core component of the state's broader modernization plan.

Agencies aren't doing enough to stop online fraud, Transunion says

by • 4 months ago

A survey of IT and security professionals found that the frequency and severity of account-takeover attacks are increasing.

Enhancing the security posture for state and local government

by • 4 months ago

With ransomware attacks on the rise, state and local leaders need to look at modern identity and access management tools to mitigate identity-based security risks.

Identity management improved during pandemic, Iowa officials said

by • 5 months ago

Iowa is in the process of deploying a new identity and access management system that officials said is improving security and efficiency.

Digital ID means no more remembering old passwords, Illinois CIO says

by • 5 months ago

Nobody wants to search for passwords — like the one used to register a boat — only used once every three years, Illinois acting CIO Jennifer Ricker said.

How states are moving faster on digital citizen services development

by • 5 months ago

Identity architect Jeet Shah shares how a developer centric IAM solution is helping agencies speed up citizen app development with a seamless and secure user experience.

Modernizing single sign-on for digital citizen services

by • 5 months ago

How state and local government agencies can shorten development time and ensure the security of citizen-facing services.

How agencies can mitigate cyber risks from unmanaged devices

by • 6 months ago

Though agencies loosened “bring-your-own-device” policies last year, they can still stay ahead of cyberthreats by integrating dynamic access policies.

TwitterFacebookLinkedInRedditGmail