Zero Trust
Zero trust is a framework built on the principle of “never trust, always verify,” which is critical for agencies handling sensitive information and operating in complex threat environments. It requires verification for every user, device and application attempting to access resources, regardless of location. This approach assumes that breaches are inevitable and focuses on minimizing the “blast radius” of an attack by limiting lateral movement and enforcing granular access control. For government and defense entities, zero-trust architectures enhance security posture by protecting against insider threats and adversarial external attacks. By implementing it, agencies can better safeguard critical data, systems, and infrastructure, ensuring mission continuity and national security.
-
ICAM and SBOMs: The Path to Zero Trust
Air Force's BESPIN Software Factory CTO James “Guideaux” Crocker and Dynatrace Federal CTO Willie Hicks discuss the path to zero trust
21m watch -
Keys to Accelerating Zero Trust Implementation
There’s no one-size-fits-all approach to zero trust, but it requires close attention to tech and culture. PARTNER CONTENT
7m read -
5G and Zero Trust Will Play Key Roles in JADC2 Success
Defense officials described how zero trust, ICAM solutions, DevSecOps and common data standards will optimize JADC2 implementation.
7m read -
Navy's Zero Trust Strategy Targets ID Solutions First
Organizations should treat zero trust like a mindset rather than as a set of rules or tools.7m read -
Agencies Take on New Zero Trust Directives in Cybersecurity Strategies
Learn how federal agencies like NASA and the departments of Defense, Health and Human Services, Homeland Security and others are approaching zero trust within their unique missions.
15m read -
Navy Tackling ID Solutions Toward Zero Trust Goal
Navy Principal Cyber Advisor Chris Cleary and DLT Chief Cyber Security Technologist Don Maclean discuss the White House Executive Order on Improving the Nation's Cybersecurity.
44m watch -
CISA Pushes for Zero Trust in Latest 5G Guidance
Zero trust continues to be a major hallmark of cloud security, which includes 5G networks.
7m read -
Air Force Will Prioritize Agile Culture in 2022
Agile methodology will inform all Air Force priorities in 2022, including hybrid cloud and zero trust.
7m read -
Security-Focused Agencies Tackle Integration Challenges of Digital Services
Low code and other cloud capabilities are used throughout DOD to ease transformation of digital services development.
7m read -
The Federal Push for Continuous Diagnostics and Mitigation
An executive order calls on agencies to implement CDM among other cybersecurity measures like zero trust.
7m read -
VA CISO Unpacks Top Priorities for 2022 and Beyond
Paul Cunningham outlines where VA is headed with its cybersecurity strategy and priorities.
7m read -
FBI, ICE Want More Cyber Authority from Congress
Federal cyber leaders clamor for cyber incident reporting legislation amid zero trust implementation.
7m read