Angel Phaneuf

Getty Images/iStockphoto/NicoElNinoweapon systems, zero trust, Cybersecurity IT engineer working on protecting network against cyberattack from hackers on internet. Secure access for online privacy and personal data protection. Hands typing on keyboard and PCB

Identity management, automation a common theme among 4 agencies’ move to zero trust

A panel of federal and industry experts describe each of their approaches to achieving a zero trust architecture to improve the security of systems and data.

Read more
Amelia Brust/Federal News Network

DoD seeks better integration between cyber risks, operations

Read more
JRSS, defense cyber, computer

Pentagon outlines plan to make continuous ATOs the new ‘gold standard’ for cybersecurity

Read more