Zero Trust
Zero trust is a framework built on the principle of “never trust, always verify,” which is critical for agencies handling sensitive information and operating in complex threat environments. It requires verification for every user, device and application attempting to access resources, regardless of location. This approach assumes that breaches are inevitable and focuses on minimizing the “blast radius” of an attack by limiting lateral movement and enforcing granular access control. For government and defense entities, zero-trust architectures enhance security posture by protecting against insider threats and adversarial external attacks. By implementing it, agencies can better safeguard critical data, systems, and infrastructure, ensuring mission continuity and national security.
-
Pentagon Eyes Next Step in Zero Trust Implementation
The Defense Department is on a path to achieve a target level for zero trust by 2027, but the implementation process will be arduous and highly complex.
7m read -
Pentagon's Biggest Challenge to Zero Trust: Data Tagging
As the Defense Department implements its zero trust roadmap, data tagging and workforce education are both a challenge and an opportunity.
7m read -
Zero Trust Enables Command and Control, Cloud at Pentagon
Defense cyber leaders are honing in on cloud modernization challenges, JWCC and zero trust.
7m read -
Zero Trust Relies on Teamwork, Federal Cyber Leaders Say
Health and civilian agencies highlighted communication and collaboration when implementing zero trust strategies.
7m read -
VA CISO Outlines Cybersecurity Strategy
Lynette Sherrill outlines cybersecurity approach amid the growing threat environment.
30m listen -
Implementing Zero Trust for the Modern Work Experience
Zero trust redefines the modern work experience by ensuring strong cybersecurity protections are in place whether you’re working from home, a coffee shop, the office, or a combat zone.
7m read -
How Zero Trust Solutions Stop Fraud at the IRS
Health and civilian agencies see major benefits from ICAM solutions, a pillar of zero trust, when protecting IT systems from phishing scams and fraudsters.
7m read -
Army Cites Data, Culture for Zero Trust Success
The Army’s Unified Network Plan and Data Plan are driving zero trust implementation, but workforce training and education are key.
7m read -
Zero Trust is Key to Hybrid Federal Workforce
Agencies are bolstering workforce training and zero trust to secure the hybrid workplace.
7m read -
How Software Factories Helped Pave the Way to Zero Trust
Cultural and technical agility underpins the Air Force's new zero trust roadmap amid Defense Department zero trust activities.
7m read -
'We're Doing It Wrong': The Navy's Plan for Better Cybersecurity
CIO Aaron Weis' take on a continuous ATO process includes moving to a currency mindset.
7m read -
Air Force Prepares to Release New Zero Trust Roadmap
CIO Lauren Knausenberger discusses software factories, zero trust and more among Air Force priorities.
59m listen