Zero Trust
Zero trust is a framework built on the principle of “never trust, always verify,” which is critical for agencies handling sensitive information and operating in complex threat environments. It requires verification for every user, device and application attempting to access resources, regardless of location. This approach assumes that breaches are inevitable and focuses on minimizing the “blast radius” of an attack by limiting lateral movement and enforcing granular access control. For government and defense entities, zero-trust architectures enhance security posture by protecting against insider threats and adversarial external attacks. By implementing it, agencies can better safeguard critical data, systems, and infrastructure, ensuring mission continuity and national security.
-
Agencies Use AI to Boost Efficiency, Cybersecurity Under White House Mandates
DLA and GAO are investigating how AI can boost efficiency and bolster cybersecurity as agencies align with the president's tech directives.
3m read -
DOD Cyber Strategy to Adapt to New Budgets, Tech Innovation
Budgetary pressures spur innovation as department tackles aging infrastructure and evolving threats, says top cyber official.
4m read -
Accelerating Modernization to Boost Pentagon’s Efficiency
Sean O’Lone, former senior assistant to the Department of Navy CIO and current CTO of SAIC’s Navy Business Group, unpacks the future of defense IT modernization.
9m watch -
DISA, Navy Progress in Zero Trust Implementation Goals
Initiatives like Flank Speed and Thunderdome are proving successful scale in zero trust around lessons learned this year.
4m read -
Modernizing Maritime Medicine on USNS Mercy
Navy's Military Sealift Command is leveraging telepresence technology and extending wireless networks to transform the way medical care is delivered.
8m watch -
Navigating Zero Trust for Cybersecurity
The World Bank Group and Lumen advance zero-trust strategies and identity management to secure sensitive data.
18m watch -
Implementing Zero Trust to Boost Resiliency
Modernization, data security and culture shifts power zero trust at DOD and Red Hat.
32m watch -
Combatting Critical Infrastructure Threats Requires Unified Cyber Approach
Cyber officials stress threats to critical infrastructure and need for a unified strategy to modernize legacy systems and boost zero trust.
4m read -
Advancing Cybersecurity with ICAM
Security leaders are developing robust identity management strategies as agencies and organizations bolster zero-trust architectures.
10m read -
Interior Taps New Acting Deputy CIO
Lou Eichenbaum, who previously served as Department of Interior's zero trust program manager, becomes acting deputy CIO.
2m read -
NIST's Latest Guidance Bolsters Identity Management
NIST is advancing zero trust and identity management with new guidance on cybersecurity, authentication and digital identity.
5m read -
Defense Leads Balance Legacy, Innovation in Move to Zero Trust
National security officials emphasize cultural change, collaboration and incremental progress in zero trust implementation.
3m read