Zero Trust
Zero trust is a framework built on the principle of “never trust, always verify,” which is critical for agencies handling sensitive information and operating in complex threat environments. It requires verification for every user, device and application attempting to access resources, regardless of location. This approach assumes that breaches are inevitable and focuses on minimizing the “blast radius” of an attack by limiting lateral movement and enforcing granular access control. For government and defense entities, zero-trust architectures enhance security posture by protecting against insider threats and adversarial external attacks. By implementing it, agencies can better safeguard critical data, systems, and infrastructure, ensuring mission continuity and national security.
-
GSA Outlines Best Practices for Identity Management
Ken Myers explains how GSA’s new playbooks are guiding federal agencies’ identity management.
7m read -
Data Management Key to Successful Zero Trust Strategy, CISA Says
Data standards and governance determine federal agencies's readiness for zero trust.
7m read -
VA CIO: Zero Trust at the Core of Agency's Vision, Security-Focused Workforce
CIO Kurt DelBene stresses the importance of building the agency's vision and workforce upon the fundamental aspects of zero trust.
7m read -
Zero Trust Defines Software Supply Chain Security at CFPB, DOE
CFPB and DOE shift their attention to zero trust as they work to eliminate risks and build a higher level of protection around their software supply chains.
5m read -
Flywheel Fridays - What You Need to Know About Zero Trust
Join our hosts for an update on evolving federal cyber priorities.
16m listen -
Pentagon: Data Management, Workforce Growth Key to Winning Future Conflicts
Reducing technical debt, ensuring zero trust cybersecurity across all connected systems, and developing a strong data foundation will be critical for winning future conflicts.
5m read -
DOD is Protecting 5G Networks with Emerging Security Techniques
Brian Kelley explains how he’s leveraging new models to secure 5G networks.
5m read -
VA Promotes Lynette Sherrill as Permanent CISO
Sherrill steps in as VA's security chief to lead a new cybersecurity approach.
5m read -
Agencies See Improvements in Workflow and Time Efficiencies with AI, RPA
SEC, USPTO and GAO use automation to maximize operations by reducing repeated tasks and optimize workflows.
5m read -
Defense Security Chief Teases 5-Year Zero Trust Strategy
Key tools within the strategy include software bills of materials and data analytics.
5m read -
VA CIO Emphasizes Role of Automation, Cybersecurity in Tech Strategy
Kurt DelBene said the agency plans to increase its spending for cybersecurity.
5m read -
Army Ramps Up Cloud Modernization Ahead of Unified Network
The service's upcoming efforts are honing in on advanced data management and analysis to expedite decision-making and joint operations.
5m read