Cryptographic


The Department of Defense has taken on the challenge of determining the safest, most appropriate way to deploy modern smartphones to warfighters while maintaining information security.

The consumerization of IT phenomenon–in particular with smartphones–has indeed posed unique challenges to U.S. federal government IT departments. While users would like to take advantage of the smart gadgets that they often also use for private use, there are substantial Information Assurance (IA) concerns regarding the use of bring-your-own-device (BYOD) initiatives. Issues of authentication, authorization, accounting and auditing are paramount. Keep reading →