Zero Trust
Zero trust is a framework built on the principle of “never trust, always verify,” which is critical for agencies handling sensitive information and operating in complex threat environments. It requires verification for every user, device and application attempting to access resources, regardless of location. This approach assumes that breaches are inevitable and focuses on minimizing the “blast radius” of an attack by limiting lateral movement and enforcing granular access control. For government and defense entities, zero-trust architectures enhance security posture by protecting against insider threats and adversarial external attacks. By implementing it, agencies can better safeguard critical data, systems, and infrastructure, ensuring mission continuity and national security.
-
Implementing Zero Trust to Boost Resiliency
Modernization, data security and culture shifts power zero trust at DOD and Red Hat.
30m watch -
Combatting Critical Infrastructure Threats Requires Unified Cyber Approach
Cyber officials stress threats to critical infrastructure and need for a unified strategy to modernize legacy systems and boost zero trust.
4m read -
Advancing Cybersecurity with ICAM
Security leaders are developing robust identity management strategies as agencies and organizations bolster zero-trust architectures.
10m read -
Interior Taps New Acting Deputy CIO
Lou Eichenbaum, who previously served as Department of Interior's zero trust program manager, becomes acting deputy CIO.
2m read -
NIST's Latest Guidance Bolsters Identity Management
NIST is advancing zero trust and identity management with new guidance on cybersecurity, authentication and digital identity.
5m read -
Defense Leads Balance Legacy, Innovation in Move to Zero Trust
National security officials emphasize cultural change, collaboration and incremental progress in zero trust implementation.
3m read -
DOD Acting CIO: JWCC is First Step in Multi-Cloud Environment
Leslie Beavers discussed next steps with JWCC, zero trust, workforce and software development amid an evolving Mission Partner Environment.
3m read -
DISA Boosts ICAM to Enhance Zero Trust
Federation and cloud adoption helps DISA drive unified user access, addressing tactical needs and insider threats.
-
Preparing for the Future Cyber Landscape
CISA and Rubrik discuss how they’re building cybersecurity best practices and developing their workforces to prepare for the future attack landscape and bolster cyber resilience.
30m watch -
Navy’s Zero Trust Successes Pave the Way for ISV 2.0
Department of the Navy IT leaders say recent zero trust successes lay the groundwork for the next phase of DON's information security vision.
3m read -
HUD’s New CIO Focuses on AI, Zero Trust
HUD's new CIO Sairah Ijaz is focusing on implementing artificial intelligence and zero trust to mature and secure the agency's IT framework.
4m read -
Defense Tech Developments to Watch in 2025
The new Fulcrum strategy sets up the Defense Department to shore up AI, zero trust and the workforce.
6m read