Zero Trust
Zero trust is a framework built on the principle of “never trust, always verify,” which is critical for agencies handling sensitive information and operating in complex threat environments. It requires verification for every user, device and application attempting to access resources, regardless of location. This approach assumes that breaches are inevitable and focuses on minimizing the “blast radius” of an attack by limiting lateral movement and enforcing granular access control. For government and defense entities, zero-trust architectures enhance security posture by protecting against insider threats and adversarial external attacks. By implementing it, agencies can better safeguard critical data, systems, and infrastructure, ensuring mission continuity and national security.
-
Government Embarks on New Collaborative Approach to Cyber Threats
The newly announced joint cyber effort is the latest in a series of new initiatives aimed at securing agencies, with CISA leading that way.
7m read -
Zero Trust Will Bolster Security Architecture at HHS OIG
The agency's CIO discusses how monitoring will be key to its future security strategy.
7m read -
How HHS is Improving Mobile Security
Best practices include multi-factor authentication and a 'least-privileged' model of managing mobile functions and protecting data.
7m read -
VA Outlines Importance of Zero Trust as Threat Landscape Evolves
Zero trust access models are essential to maintaining robust security frameworks.
7m read -
What is Zero Trust? Federal Agencies Embrace Cybersecurity Innovation
From buzzword to White House imperative, zero trust can be a confusing but necessary concept for security strategies.
7m read -
Why Good Cybersecurity Requires Leadership Buy-In, Culture Shift
Federal agencies can start by applying a zero trust security model to cloud operations.
7m read -
New DHS CIO Tackles Supply Chain Risk Management, Interoperability
The Department of Homeland Security is in the process of setting up a supply chain risk management office to report to the chief information security officer, DHS CIO Eric Hysen told GovernmentCIO Media & Research.
7m read -
DHS Cyber Leaders Say Biden Cyber Order is a Long-Term Roadmap
Department of Homeland Security cyber leaders see President Joe Biden’s Executive Order on Improving the Nation’s Cybersecurity as the beginning of a “journey” to develop more comprehensive, consistent cybersecurity strategies at federal agencies.
7m read -
More Zero Trust, Information-Sharing to Come Amid Colonial Pipeline, SolarWinds Incidents
As cyber crime explodes, cyber experts and federal cyber leaders insist on systemic change.
7m read -
SolarWinds Opened the Door for Cybersecurity Culture Overhaul at DHS
DHS and CISA want to lead the federal register and private industry by example.
7m read -
The Security Piece to the 5G Implementation Puzzle
CISA and DOD discussed what the U.S. needs to successfully rollout 5G.
7m read -
Federal CIO Stresses Skilling, Diversifying Workforce for Future of Fed IT
Agencies need a robust, ready workforce to take on top IT challenges and goals of the new decade.
7m read