Zero Trust
-
Zero Trust Could Help Solve JADC2’s Communication Problems
DOD space leaders want rapid, iterative development of JADC2 capabilities, but need to communicate securely.
5m read -
DOD, OMB Agree Identity Management Is Key To Implementing Zero Trust
Identity management, level of assurance and single source of truth are pillars of the zero trust approach to cybersecurity.
5m read -
Culture Drives Cybersecurity for DHS, DOD
Concepts and mandates such as cyber incident reporting, DevSecOps and zero trust only go so far.
5m read -
What is ICAM's Role in Federal Zero Trust?
Many federal agencies are tackling identity, credential and access management solutions to help them in their new zero trust approach to security.
5m read -
Good Cybersecurity Requires Enterprise-Wide Collaboration, VA CDO Says
VA’s CDO Kshemendra Paul said cybersecurity and zero trust require effective data management.
5m read -
DOD’s Portfolio Management Office Accelerates Adoption of Zero Trust
The addition of a Portfolio Management Office advances zero trust efforts and interoperability within DOD.
14m listen -
AI Will Drive Cyber Efforts at CYBERCOM Amid Zero Trust
CYBERCOM Executive Director Dave Frederick discussed his priorities and cyber concerns as the command gets more budgetary control.
5m read -
Army's 2023 IT Budget Priorities Include AI, Zero Trust
Army CIO Dr. Raj Iyer said the department is 'at an inflection point' for IT modernization to meet future threats.
3m read -
Marine Corps Taking Hybrid Approach to Zero Trust Architecture
Identity and automation are supporting military personnel amid zero trust architecture implementation, but a skilled workforce is still needed.
5m read -
Agencies Tackle Obstacles to Zero Trust Implementation
CISA’s CDM lead wants agencies to harness data and application security within their cybersecurity strategies.
5m read -
Army Software Factory's Strategy for Zero Trust at DOD
Zero trust interoperability is critical for DOD in order to implement JADC2.
18m listen -
Successful Cybersecurity Integrates Agile and Well-Trained Users
Training a cyber-aware workforce can transform end users from potential vulnerabilities into security enablers.
5m read