Zero Trust | GovernmentCIO Media & Research

Zero Trust

With phishing and the upcoming election, securing infrastructure remains a top necessity that initiatives like TIC 3.0 will advance.
Federal IT leads say the strategy lets agencies ‘use the tools we have’ to modernize security.
Identity-based approach to verification moves beyond perimeters and VPNs.
Vulnerabilities lead to questions about home networks and "bring-your-own-device" policies.
Forward-thinking agencies face fewer vulnerabilities as attacks ramp up in intensity.
Agencies need a robust, ready workforce to take on top IT challenges and goals of the new decade.
A layered defense approach won’t work anymore — zero trust is necessary as the Defense Department moves to the cloud.
Managing the data lifecycle is a mission-critical task for all agencies.
GSA's approach to managing passwords resembles shared services.