Zero Trust | GovernmentCIO Media & Research

Zero Trust

Join our hosts for the Flywheel Fridays finale and a look back at the most memorable headlines of the year.
First of its kind strategy will guide the agency in achieving a more robust cybersecurity framework that will reduce risk and improve user experience.
New process efficiencies in automation and cybersecurity will enable increased processing of PACT Act claims.
AI, zero trust and software modernization highlight an unclassified version of the Defense Department's defense strategy.
Cybersecurity concerns resulting from the Russia-Ukraine war are leading to new security approaches for satellites.
The strategy lists secure, survive and strike as the primary principles for defense in cyberspace.
Mobile threat detection and other capabilities are protecting data and enhancing the user experience at ICE.
Testing, scaling and interoperability are the remaining impediments as DISA moves closer to completing its Thunderdome zero trust prototype.
The Department of Education builds incident response and recovery plan on resilience and guidance from the National Institute of Standards and Technology.
Lt. Gen. John Morrison says Army plans to increase BYOD program users to 20,000.
BYOD program will let soldiers and DOD civilians securely access government systems through their personal devices
The service is moving away from being network focused to being data centric.
The Department of Veterans Affairs is accelerating its cybersecurity approach, adopting new architectures like zero trust to better secure veteran data.
Join our researchers for a recap of GovCIO Media & Research's recent CyberScape events.
Zero trust and a strong cybersecurity culture will help the Department of the Navy prepare its data for AI.
Zero trust is sweeping across government. Following the May 2021 White House Executive Order on Improving the Nation's Cybersecurity, IT leaders are implementing new structures to build the foundation for zero trust.
CISA's new directive aims to improve asset visibility and allow to manage cybersecurity risks federal agencies face.
Agencies are aligning security and performance needs.
Modernizing approaches to software security leads to better detecting vulnerabilities and preventing zero-day incidents like the SolarWinds attack.
Ken Myers explains how GSA’s new playbooks are guiding federal agencies’ identity management.