zero trust

Zero trust builds on identity management

Having a robust ID management program in place is one of the most effective ways to enhance governments’ cybersecurity, and experts say it is within reach.

States sketch out roadmaps for zero trust ‘journey’

As states experiment with zero trust, they are working out technologies, governance and procedures for securing IT infrastructure.

Agencies face interoperability challenges with zero trust, GAO says

Because there is no single zero-trust solution, agencies must integrate new and existing solutions, a challenge for those with large investments in traditional technologies, the watchdog agency said.

No ‘silver bullet’ for zero trust

Because there are no comprehensive solutions available, governments need multiple efforts to happen at once, a county cyber exec advised.

Identity as the new perimeter: How one county launched its zero trust initiative

“If you can’t get your arms around identity, you’re never going to be able to address zero trust,” Maricopa County’s CISO Lester Godsey said.

Report: Government implementing zero trust architecture faster than corporations

Government’s speedy zero trust implementation is noteworthy for an institution that is “not usually ahead of the curve,” according to a report.

State, local government primed for zero trust

While a zero trust architecture is only required for federal agencies, state and local chief information security officers are considering ways the buzz around the strategy can help them boost their cybersecurity posture and prepare for a zero-trust future.

Army plans ICAM rethink to support unified network operations

To make mobile device use more secure, the Army is preparing a new identity and access requirements as it adopts zero trust security principles.

Maintaining zero trust over time: Why set-it and forget-it won’t work

Zero trust requires continuous revalidation of trustworthiness -- of the devices, services and identities connecting into an enterprise environment, as well as the systems to which they are connecting.

7 cyber defense use cases

Whether facing data loss, ransomware, fraud or privacy threats, agencies can leverage technology and process solutions to help them prevent and respond to attacks.