Defense Innovation Board wants to help DOD understand zero trust
"The traditional notion of perimeter-based security is no longer sufficient," board member Kurt DelBene said at a quarterly meeting of the DIB.
Agencies moving forward on TIC 3.0 without finalized policy
The Office of Management and Budget is encouraging them to run pilots blending cybersecurity with their networking approaches because legacy systems need updating.
Identity authentication tools agencies can use to move towards zero trust
Government networks remain vulnerable to breaches from phishing attacks. Security experts in a new podcast outline solutions to tighten identity authentication controls.
Should agencies pilot zero trust now?
Many have successfully implemented elements of ZT, but at least one security expert cautioned waiting until they have a handle on all their data.
Will agencies implement zero trust faster with TIC 3.0?
A new ACT-IAC report found no vendors offer a complete ZT solution, but the OMB guidance should make it easer for agencies to use existing procurement vehicles to meet their needs.
Security controls that verify users and devices protect agencies from insider threats
Zero-trust security practices make it harder for malicious users to move laterally across a system once they have gained access behind the firewall, report says.