Zero Trust
Zero trust is a framework built on the principle of “never trust, always verify,” which is critical for agencies handling sensitive information and operating in complex threat environments. It requires verification for every user, device and application attempting to access resources, regardless of location. This approach assumes that breaches are inevitable and focuses on minimizing the “blast radius” of an attack by limiting lateral movement and enforcing granular access control. For government and defense entities, zero-trust architectures enhance security posture by protecting against insider threats and adversarial external attacks. By implementing it, agencies can better safeguard critical data, systems, and infrastructure, ensuring mission continuity and national security.
-
Army Cites Data, Culture for Zero Trust Success
The Army’s Unified Network Plan and Data Plan are driving zero trust implementation, but workforce training and education are key.
7m read -
Zero Trust is Key to Hybrid Federal Workforce
Agencies are bolstering workforce training and zero trust to secure the hybrid workplace.
7m read -
How Software Factories Helped Pave the Way to Zero Trust
Cultural and technical agility underpins the Air Force's new zero trust roadmap amid Defense Department zero trust activities.
7m read -
'We're Doing It Wrong': The Navy's Plan for Better Cybersecurity
CIO Aaron Weis' take on a continuous ATO process includes moving to a currency mindset.
7m read -
Air Force Prepares to Release New Zero Trust Roadmap
CIO Lauren Knausenberger discusses software factories, zero trust and more among Air Force priorities.
59m listen -
Zero Trust at the Pentagon
Federal leaders are streamlining consistent, interoperable zero trust solutions for improved user experience and mission accomplishment.
7m read -
Edge Computing Critical To JADC2 Success
The joint force needs transformational computing technologies to achieve JADC2.
7m read -
Air Force Lays Groundwork For Smart Bases with Zero Trust
A new zero trust strategy may alleviate department challenges in creating a connected ecosystem on military bases.
7m read -
The Armed Services Wish List for Hybrid Cloud Security
Defense cloud leaders dissect cloud security myths and challenges, with DevSecOps and zero trust as the pillars of a secure hybrid cloud.
7m read -
Inside the Pentagon's Roadmap to Zero Trust
First of its kind strategy will guide the agency in achieving a more robust cybersecurity framework that will reduce risk and improve user experience.
7m read -
Fostering a Zero Trust Culture
Federal cyber leaders at the Army Software Factory, General Services Administration and Rubrik discuss how to foster a zero trust culture for a more secure future.
28m watch -
PACT Act Brings Focus to Cyber, Automation at VA
New process efficiencies in automation and cybersecurity will enable increased processing of PACT Act claims.
7m read