What Zero Trust Means for the Federal Employee
Zero trust would combat two of today’s greatest security challenges: increased endpoints driven by telework and the misuse of privileged credentials.
Zero trust would combat two of today’s greatest security challenges: increased endpoints driven by telework and the misuse of privileged credentials.
Security has to be baked into the architecture from the outset, and must extend seamlessly across the operation.
he CIS CyberMarket provides state, local, tribal and territorial agencies with the opportunity to leverage collective purchasing power with industry-leading cyber vendors.
In a perfect world, cybersecurity isn’t restrictive. You read that right.
Zero trust’s fundamental concepts have been around a long time and are here to stay (even if the buzzwords change).
Protocols such as zero trust and identity management aren’t new in the world of cybersecurity. What’s new, and driving urgency, is the cyber threat landscape.
The belief that the government should treat all of its data and services as if they were exposed to the public internet might sound extreme.
Zero trust at its best is invisible, meaning it doesn’t create barriers for work but rather enhances the user experience through intentional security practices.
For 25 years, the Government Accountability Office (GAO) has labeled cybersecurity a high risk. But a lot has changed since it made the list in 1997.
So much of our world, our lives, is controlled by software. The delivery of practically all vital public services hinges on trustworthy software.