Zero Trust
Zero trust is a framework built on the principle of “never trust, always verify,” which is critical for agencies handling sensitive information and operating in complex threat environments. It requires verification for every user, device and application attempting to access resources, regardless of location. This approach assumes that breaches are inevitable and focuses on minimizing the “blast radius” of an attack by limiting lateral movement and enforcing granular access control. For government and defense entities, zero-trust architectures enhance security posture by protecting against insider threats and adversarial external attacks. By implementing it, agencies can better safeguard critical data, systems, and infrastructure, ensuring mission continuity and national security.
-
Zero Trust Strategies to Secure Federal Systems
Tech modernization and the demands of the COVID-19 pandemic have pushed major agencies to embrace IT security that protects against newfound vulnerabilities.
7m read -
How NASA, State Department Are Securing the Cloud
Cybersecurity is a challenge in hybrid cloud environments with disparate missions.
7m read -
Government Embarks on New Collaborative Approach to Cyber Threats
The newly announced joint cyber effort is the latest in a series of new initiatives aimed at securing agencies, with CISA leading that way.
7m read -
Zero Trust Will Bolster Security Architecture at HHS OIG
The agency's CIO discusses how monitoring will be key to its future security strategy.
7m read -
How HHS is Improving Mobile Security
Best practices include multi-factor authentication and a 'least-privileged' model of managing mobile functions and protecting data.
7m read -
VA Outlines Importance of Zero Trust as Threat Landscape Evolves
Zero trust access models are essential to maintaining robust security frameworks.
7m read -
What is Zero Trust? Federal Agencies Embrace Cybersecurity Innovation
From buzzword to White House imperative, zero trust can be a confusing but necessary concept for security strategies.
7m read -
Why Good Cybersecurity Requires Leadership Buy-In, Culture Shift
Federal agencies can start by applying a zero trust security model to cloud operations.
7m read -
New DHS CIO Tackles Supply Chain Risk Management, Interoperability
The Department of Homeland Security is in the process of setting up a supply chain risk management office to report to the chief information security officer, DHS CIO Eric Hysen told GovernmentCIO Media & Research.
7m read -
DHS Cyber Leaders Say Biden Cyber Order is a Long-Term Roadmap
Department of Homeland Security cyber leaders see President Joe Biden’s Executive Order on Improving the Nation’s Cybersecurity as the beginning of a “journey” to develop more comprehensive, consistent cybersecurity strategies at federal agencies.
7m read -
More Zero Trust, Information-Sharing to Come Amid Colonial Pipeline, SolarWinds Incidents
As cyber crime explodes, cyber experts and federal cyber leaders insist on systemic change.
7m read -
SolarWinds Opened the Door for Cybersecurity Culture Overhaul at DHS
DHS and CISA want to lead the federal register and private industry by example.
7m read