Zero Trust
Zero trust is a framework built on the principle of “never trust, always verify,” which is critical for agencies handling sensitive information and operating in complex threat environments. It requires verification for every user, device and application attempting to access resources, regardless of location. This approach assumes that breaches are inevitable and focuses on minimizing the “blast radius” of an attack by limiting lateral movement and enforcing granular access control. For government and defense entities, zero-trust architectures enhance security posture by protecting against insider threats and adversarial external attacks. By implementing it, agencies can better safeguard critical data, systems, and infrastructure, ensuring mission continuity and national security.
-
Tech Modernization Will Not Function in Isolation, Defense Leaders Say
Defense leaders say synergy is key for success in modernizing the technology critical for concepts like CJADC2.
4m read -
Federal Efforts to Secure Data and Build Resiliency
This issue delves into advancements in cyber resiliency within the federal government amid an evergrowing digital world.
16m read -
Air Force CTO Jay Bonci Departs After Three Years
The tech chief oversaw the service’s enterprise IT development, technology roadmaps and zero-trust implementation.
3m read -
GSA Taps Dovarius Peoples as Deputy CIO
Peoples previously served as CIO of the U.S. Army Corps of Engineers and oversaw the service's cloud migration and data modernization.
1m read -
Acting DOD CIO: Defense Cloud Contract Vehicle is 'Off to the Races'
Leslie Beavers said the Joint Warfighting Cloud Capability vehicle has surpassed $1 billion in task orders.
4m read -
How Protecting Data Builds Cyber Resiliency
Government agencies produce increasing amounts of data each day, with gigabytes of information being transmitted and stored in cloud-based environments.
16m read -
It Takes Shifting Culture to Institute Zero Trust in Government
Federal officials say that priorities in identity management are critical to cybersecurity, but it requires a mindset shift.
3m read -
New Zero Trust Overlays Codify DOD Cybersecurity Strategy
The overlay document asks Defense Department components to standardize its implementation strategy across the enterprise.
4m read -
The Keys to Implementing Zero Trust are People, Process, Tech
Partnerships with private sectors and user-centric frameworks are key to defending against cyber adversaries.
3m read -
Emerging Technologies Transform VA Cybersecurity Approach
Deputy CISO Amber Pearson discusses how new cybersecurity approaches are helping the agency protect data and serve veterans.
4m read -
Meeting Zero Trust Goals in Government
Agencies are learning new ways to implement zero trust ahead of administration goals.
15m read -
TechNet Cyber: Removing Ambiguity in Zero Trust
Randy Resnick, Chief Zero Trust Officer for Zero Trust Portfolio Management Office, DOD
25m listen