A Zero Trust Approach to Cybersecurity
A zero trust approach to cybersecurity can help agencies strike a balance between carelessness and caution on their networks.
A zero trust approach to cybersecurity can help agencies strike a balance between carelessness and caution on their networks.
Homeland Security Department Chief Information Officer John Zangardi shared his strategy for retaining cyber talent and modernizing DHS networks and security operations centers.
Government agencies need to move toward a multi-layered, corroborative approach to fraud, providing the best of defense, hospitality, and ease of use.
While states and localities may feel helpless against the endless onslaught of cyberattacks, there are preventative measures they can take to avoid falling victim.
In 2010, the phrase “a zero trust approach to cybersecurity” emerged to describe continuous monitoring and least privilege access control working together.
GovLoop heard from Academy participants who credit the program for their newfound cyber skills. For now, they will use those skills in their current roles.
Congress mandated the new commission to protect U.S. cybersecurity by learning from America’s Cold War strategy for the Soviet Union.
Agencies should take these three key next steps to Improve their FITARA 8.0 scorecards.
Cloud computing is an integral piece of today’s IT government infrastructure. That means cloud security is top of mind for nearly all government leaders.
Some of the main challenges that highlight the complexity of cloud security in government today.