Zero Trust
Zero trust is a framework built on the principle of “never trust, always verify,” which is critical for agencies handling sensitive information and operating in complex threat environments. It requires verification for every user, device and application attempting to access resources, regardless of location. This approach assumes that breaches are inevitable and focuses on minimizing the “blast radius” of an attack by limiting lateral movement and enforcing granular access control. For government and defense entities, zero-trust architectures enhance security posture by protecting against insider threats and adversarial external attacks. By implementing it, agencies can better safeguard critical data, systems, and infrastructure, ensuring mission continuity and national security.
-
The Keys to Implementing Zero Trust are People, Process, Tech
Partnerships with private sectors and user-centric frameworks are key to defending against cyber adversaries.
3m read -
Emerging Technologies Transform VA Cybersecurity Approach
Deputy CISO Amber Pearson discusses how new cybersecurity approaches are helping the agency protect data and serve veterans.
4m read -
Meeting Zero Trust Goals in Government
Agencies are learning new ways to implement zero trust ahead of administration goals.
15m read -
TechNet Cyber: Removing Ambiguity in Zero Trust
Randy Resnick, Chief Zero Trust Officer for Zero Trust Portfolio Management Office, DOD
25m listen -
Equipping Warfighters Requires Tech, Personnel and Innovation
Pentgon tech officials say modernization and recruiting quickly is critical to staying ahead of adversaries.
4m read -
TechNet Cyber: Pentagon’s Fulcrum Strategy Strengthens Zero Trust
Agency official George Lamb said being ‘risk tolerant’ is critical for cybersecurity and identity management.
15m watch -
DOD Zero Trust Chief: ZT Implementation Requires Clearer Standards
Randy Resnick, director of the DOD Zero Trust Portfolio Management Office, announced an upcoming memo to eliminate ambiguity on its zero-trust guidelines.
5m read -
Fulcrum Strategy is a 'Community Effort' to Boost DOD Cyber Foundation
The strategy provides four new lines of effort for how the Defense Department will lead cybersecurity efforts.
4m read -
Feds Tackle the Soft Side of AI, Zero Trust Tech Priorities
Leaders from VHA and NIH share how they are tackling security directives through change management and workforce development.
3m read -
Agency Leaders Call Cybersecurity 'Kitchen Table' Topic
The conversation around cybersecurity is changing. Civil society now joins the federal and industry conversation.
3m read -
ACF Taps New CISO From Education Department
Hanan Abu Lebdeh announced the move on LinkedIn on Monday.
4m read -
AI Aids USAJobs' Move to the Cloud
Agencies grapple with AI development and developing use cases that improve workforce and mission priorities.
3m read