Identity authentication tools agencies can use to move towards zero trust
Government networks remain vulnerable to breaches from phishing attacks. Security experts in a new podcast outline solutions to tighten identity authentication controls.
Should agencies pilot zero trust now?
Many have successfully implemented elements of ZT, but at least one security expert cautioned waiting until they have a handle on all their data.
Will agencies implement zero trust faster with TIC 3.0?
A new ACT-IAC report found no vendors offer a complete ZT solution, but the OMB guidance should make it easer for agencies to use existing procurement vehicles to meet their needs.
Security controls that verify users and devices protect agencies from insider threats
Zero-trust security practices make it harder for malicious users to move laterally across a system once they have gained access behind the firewall, report says.