Zero Trust | GovernmentCIO Media & Research

Zero Trust

U.S. Army is in the midst of a significant restructuring of its program executive offices as it's working on building a secure unified network.
CISA's updated guidance provides more technical depth across the five pillars of zero trust and adds a new maturity stage.
Edge computing is vital to the warfighter but securing networks and enabling data access at the network edge remain difficult.
A new Army program office provides a centralized approach to implement zero trust across the enterprise.
The Defense Department is on a path to achieve a target level zero trust by 2027, but the implementation process will be arduous and highly complex.
Defense tech leaders at TechNet Cyber 2023 explain how JWCC will build upon the military departments' ongoing cloud efforts and software factories.
DOD CIO John Sherman outlines his IT priorities this year.
Software modernization at the Defense Department is key to maintaining a competitive advantage in modern warfare.
DOD wants more visibility into the commercial cloud service provider side, rather than just the customer side.
The Defense Information Systems Agency reflects on the recently completed zero trust pilot and implications for the armed services.
As the Defense Department implements its zero trust roadmap, data tagging and workforce education are both a challenge and an opportunity.
Defense cyber leaders are honing in on cloud modernization challenges, JWCC and zero trust.
Health and civilian agencies highlighted communication and collaboration when implementing zero trust strategies.
Increased capacity for critical information requires efficient and secure maintenance of systems.
The use of unauthorized technology has become increasingly prevalent in the remote work environment, weakening cybersecurity.
Air Force and CISA programs are securing critical data and IT infrastructures.
The Defense Department’s CMMC program and NIST guidance are helping agencies reap the benefits of hybrid cloud without sacrificing security.
The strategy calls on software developers to assume more responsibility for cyberattacks due to poorly developed code, common to the open-source community.
On the anniversary of Russia invading Ukraine, military tech leaders are focused on improving communication between the sister services and allied partners without sacrificing cybersecurity.
Former HHS OIG CIO Gerald Caron takes on a new role as ITA CIO.