FB pixel

Intercede announces new guide to mobile device authentication for federal agencies

Categories Access Control  |  Biometrics News
 

Intercede has announced the launch of a cybersecurity guidance resource for federal agencies required to authenticate individuals through mobile devices for access to information systems and applications. The resource is the result of a two-year collaboration with the National Institute of Standards and Technology’s (NIST’s) National Cybersecurity Center of Excellence (NCCoE).

The second draft of NIST Special Publication (SP) 1800-12, Derived Personal Identity Verification (PIV) Credentials outlines practical, interoperable security approaches, created in collaboration with Intercede and other vendors. Intercede’s contribution includes reference software and technical consultancy.

“Federal government has always had a strong desire to mobilize its workforce. However, until now it has been blocked by numerous technical and operational challenges,” says Intercede CTO Chris Edwards. “Intercede has developed the technology to significantly improve mission-critical systems, but without clear, independent recommendations for deployment, the uptake has and will continue to be slow. Multi-factor authentication urgently needs to become the de facto standard for government security. This is why Intercede has collaborated with the NCCoE in the architectures documented in the practice guide that will vastly improve cybersecurity for federal agencies, with derived PIV credentials for mobile devices at the core.”

The White House Office of Management and Budget found in a recent report that nearly three quarters of the 96 federal agencies it assessed are “at risk” or “high risk” of cyberattack, and Intercede cites a recent survey that found more than 60 percent of federal agencies have experienced a security incident involving a mobile device. The new practice guide is intended to help federal agencies and other organizations reduce risk and cost associated with implementing unnecessary or additional technologies, while ensuring compliance with federal directives.

“Collaborating with stakeholders such as federal agencies, businesses, technology providers, and integrators to produce viable cybersecurity solutions is key to the NCCoE’s success,” comments computer scientist and NCCoE’s Derived PIV Credentials Project team project lead Bill Newhouse. “The Derived PIV Credentials Practice Guide is another successful example of how these stakeholders engage with the NCCoE to produce solutions to real-world problems such as protecting IT systems through implementation of secure authentication standards.”

The draft is available for download from the NCCoE website.

Related Posts

Article Topics

 |   |   |   |   |   | 

Latest Biometrics News

 

Agentic AI working groups ask what happens when we ‘give identity the power to act’

The pitch behind agentic AI is that large language models and algorithms can be harnessed to deploy bots on behalf…

 

Nothin’ like a G-Knot: finger vein crypto wallet mixes hard science with soft lines

Let’s be frank: most biometric security hardware is not especially handsome. Facial scanners and fingerprint readers tend to skew toward…

 

Idemia Smart Identity negotiates with Nepal, nears ID document issuance in Armenia

A pair of deals for Idemia Smart Identity to supply biometric ID documents, one in Nepal and one in Armenia,…

 

Rapid expansion of DHS’s citizenship database raises new election concerns

Over the past month, the Department of Homeland Security (DHS) has quietly transformed the Systematic Alien Verification for Entitlements (SAVE)…

 

Aurigin adds voice liveness detection to Swisscom identity infrastructure

Aurigin.ai is collaborating with Swisscom Digital Trust to strengthen existing KYC processes with voice-based liveness verification and AI deepfake detection,…

 

Self completes $9M seed round, introduces points scheme for verification

Self, which provides zero-knowledge identity and proof-of-personhood (PoP) infrastructure, has announced the completion of a nine-million-dollar seed raise earlier this…

Comments

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Biometric Market Analysis

Most Viewed This Week

Featured Company

Biometrics Insight, Opinion

Digital ID In-Depth

Biometrics White Papers

Biometrics Events