The National Institute of Standards and Technology (NIST) this month released draft guidance on derived credentials for authenticating mobile devices on federal networks. Users who want to logon to a sensitive federal computer typically must insert their Personal Identity Verification (PIV) cards–called Common Access Cards (CAC) at the Department of Defense–into the machine. This creates a challenge for smartphones and tablets that are too small for an internal card reader. A derived credential solves this problem by storing the authenticating…
Recommended
Army Accepts First Optionally-Piloted Black Hawk, Will Inform Scaling Autonomy Across The Fleet
Trending
Congress Updates
Hegseth Acknowledges Potential $200 Billion Iran Supplemental Request, Final Figure ‘Could Move’
Defense Secretary Pete Hegseth on Thursday acknowledged the Pentagon could potentially ask Congress for $200 billion in supplemental funding to support the ongoing operation against Iran and replenish munitions used […]
Counter-Drone Flyaway Kit Used In U.S. In Early Hours Of Iran Strikes, NORTHCOM Head Says
U.S. Northern Command (NORTHCOM) used a counter small unmanned aircraft system (sUAS) flyaway kit (FAK) in the early hours of the strikes against Iran on Feb. 28, according to Air […]
Army Taking ‘More Refined’ Approach On Push For Right To Repair Reforms, Obadal Says
After lawmakers decided against including major “right to repair” reforms in the latest defense policy bill, a senior Army official has said the service is continuing its push for authorities […]
Counter-Drone Needs Will Be Addressed In Next NDAA Based On Iran War Lessons, Banks Says
A Republican senator on Armed Services Committee on Thursday said that defending against Iranian drones has been challenge for U.S. warfighters and will be an area of focus in the […]
By