zero trust

zero trust, cybersecurity defense shield on blue background

The browser-shaped hole in ZTNA

As webapps become a trusted part of the way organizations do business, the risk unevaluated websites pose to zero trust architectures is underestimated.

Read more
Getty Images/iStockphoto/TraitovCybersecurity and secure nerwork concept. Data protection, gdrp. Glowing futuristic backround with lock on digital integrated circuit.

Energy Dept advisor studying intersection of OT and zero trust

Read more
Cybersecurity concept

NIST issues digital identity update allowing agencies to use synced passkeys

Read more
zero trust, cybersecurity defense shield on blue background

The open standard that is unlocking zero trust collaboration with allies

Read more
Getty Images/iStockphoto/NicoElNinopolicy and data, weapon systems, zero trust, Cybersecurity IT engineer working on protecting network against cyberattack from hackers on internet. Secure access for online privacy and personal data protection. Hands typing on keyboard and PCB

Zero trust for weapons systems will be a ‘heavy lift’ for DoD

Read more
cybersecurity concept with biometric technology element

DoD to automate assessment of zero trust implementation plans

Read more
CISA, cybersecurity, budget

Biden budget request includes $13B for cybersecurity, continuing upward trend

Read more
Getty Images/iStockphoto/KanawatTH

Navigating the complexities of zero trust in the modern cybersecurity landscape

Read more
Getty Images/iStockphoto/NicoElNinopolicy and data, weapon systems, zero trust, Cybersecurity IT engineer working on protecting network against cyberattack from hackers on internet. Secure access for online privacy and personal data protection. Hands typing on keyboard and PCB

It’s more crucial than ever for agencies to mitigate insider risk

Transitional periods — even those spurred by a desire for greater cybersecurity — tend to increase insider risk.

Read more
United States Syria Islamic State

Central Command to release new data strategy

CENTCOM is paving its own data narrative with a new strategy while moving closer to Combined Joint All-Domain Command and Control.

Read more
CISA agency

CISA’s new plan to better align cybersecurity operations

The Cybersecurity and Infrastructure Security Agency is introducing a new strategic approach for 2024 called the Federal Enterprise Operations Cyber Alignment Plan.

Read more