Operation Security: How DOD is Tapping Hardware Security Keys to Protect Against Threats

Today’s threat landscape has become increasingly complex, and the Defense Department is especially vulnerable in areas that the CAC isn't best suited for such as non-CAC eligible employees and contractors, telework, and mobile/BYOAD. Now, the DOD is investing in modern authentication tools and technologies, such as hardware security keys, to secure its environment. Here’s how.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms and Conditions apply.

IMPORTANT NOTICE
Any information you supply is subject to our privacy policy. Access to this content is available to registered members at no cost. In order to provide you with this free service, Government Executive Media Group may share member registration information and other information you have provided to us with content sponsors.