Zero Trust
-
Data Mapping, Operational Understanding Are Next Steps For Zero Trust
Agencies are aligning security and performance needs.
7m read -
Federal Agencies Implementing New Approaches to Software Security
Modernizing approaches to software security leads to better detecting vulnerabilities and preventing zero-day incidents like the SolarWinds attack.
7m read -
GSA Outlines Best Practices for Identity Management
Ken Myers explains how GSA’s new playbooks are guiding federal agencies’ identity management.
7m read -
Data Management Key to Successful Zero Trust Strategy, CISA Says
Data standards and governance determine federal agencies's readiness for zero trust.
7m read -
VA CIO: Zero Trust at the Core of Agency's Vision, Security-Focused Workforce
CIO Kurt DelBene stresses the importance of building the agency's vision and workforce upon the fundamental aspects of zero trust.
7m read -
Zero Trust Defines Software Supply Chain Security at CFPB, DOE
CFPB and DOE shift their attention to zero trust as they work to eliminate risks and build a higher level of protection around their software supply chains.
5m read -
Flywheel Fridays - What You Need to Know About Zero Trust
Join our hosts for an update on evolving federal cyber priorities.
16m listen -
Pentagon: Data Management, Workforce Growth Key to Winning Future Conflicts
Reducing technical debt, ensuring zero trust cybersecurity across all connected systems, and developing a strong data foundation will be critical for winning future conflicts.
5m read -
DOD is Protecting 5G Networks with Emerging Security Techniques
Brian Kelley explains how he’s leveraging new models to secure 5G networks.
5m read -
VA Promotes Lynette Sherrill as Permanent CISO
Sherrill steps in as VA's security chief to lead a new cybersecurity approach.
5m read -
Agencies See Improvements in Workflow and Time Efficiencies with AI, RPA
SEC, USPTO and GAO use automation to maximize operations by reducing repeated tasks and optimize workflows.
5m read -
Defense Security Chief Teases 5-Year Zero Trust Strategy
Key tools within the strategy include software bills of materials and data analytics.
5m read