Government Technology Insider
  • About
  • State & Local
  • Civilian
  • Defense & IC
SUBSCRIBE
No Result
View All Result
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
Government Technology Insider
  • Acquisition
  • AI & Data
  • Cybersecurity
  • CX
  • Digital Transformation
  • Hybrid Work
    • Work Smarter
  • Public Safety
  • Resources
    • The Frontlines of Customer Experience
    • Innovative Solutions for Connecting Agencies
    • Be Ready For What’s Next
No Result
View All Result
Government Technology Insider
No Result
View All Result
Home Civilian

Public Sector Agencies are Implementing a Zero Trust Approach to Cybersecurity

by Kelsey Winick
September 1, 2021
in Civilian, Cybersecurity
Reading Time: 3 mins read
A A
Implementing a Zero Trust
Share on FacebookShare on Twitter

Federal agencies are looking for advanced cybersecurity strategies, including implementing a Zero Trust approach, to combat the increase in malware attacks and meet the requirements of the Biden Administration’s Executive Order on Cybersecurity. With a Zero Trust approach, agencies are able to monitor users on their networks closely and control access with much more granularity.

CTO of Homeland Security and CISOs from Navy and Customs and Border Protection Discuss Zero Trust Network Implementation

The switch to the remote work environment because of the COVID-19 pandemic necessitated agencies focusing on their cybersecurity strategies. As a result, the implementation of Zero Trust Architecture became a top priority for agencies. Zero Trust assures that the users connecting to an agency’s network only receive access to what they need and nothing more. “Zero Trust can help increase capabilities while also reducing risk,” said Brian Campo, Deputy CTO, Department of Homeland Security.

Read the full story here.

Zero Trust-Like Approach Needed for Microelectronics Industry, Former DoD Official Says

Lisa Porter, who previously served as the first director of the Intelligence Advanced Research Projects Activity, commented that the U.S. should take an approach to shore up the microelectronics supply chain akin to the Zero Trust model for cybersecurity rather than overemphasize onshoring and subsidizing. Officials are debating how to respond to the global chip shortage while assuring that the technology is available and secure. Porter recommends that the U.S. take on a Zero Trust approach for microelectronics.

Read the full story here.

Securing Data in a Multi-Cloud Environment: The Value of a Zero Trust Approach

Over the past two years, there have been several malware attacks, such as the SolarWinds hack and the ransomware attack on the Colonial Pipeline. On May 12, 2021, President Biden issued an Executive Order (EO) on cybersecurity that outlines a new course for national cybersecurity and the protection of federal government agencies. Increasingly, agencies are implementing a Zero Trust approach into their cybersecurity strategies. Zero Trust works with existing security infrastructure. “With a traditional network defense posture, once a user was validated, they were free to move about the network. But with a Zero Trust posture, not only can I decide if I’m going to let you into the network, but I can then decide where you have permission to go and what you can access. Zero Trust provides a much more granular level of control,” said Cameron Chehreh, Federal Chief Technology Officer at Dell Technologies

Read the full story here.

Tags: cybersecurityDellmalwareRansomwareRemote WorkSecuritysupply chainVerizonZero TrustZero Trust ApproachZero Trust Network

RELATED POSTS

Disaster Response Communication Challenges
Civilian

Overcoming Disaster Response Communication Challenges

August 15, 2022
Unified Platforms
Civilian

Unified Platforms are Breaking Down Silos and Bolstering Cybersecurity

August 15, 2022
Border Security
5G & Mobility

Border Security: Podcast Part 2

August 12, 2022

TRENDING NOW

  • Advana

    Meet Advana: How the Department of Defense Solved its Data Interoperability Challenges

    5989 shares
    Share 2396 Tweet 1497
  • Overcoming Disaster Response Communication Challenges

    38 shares
    Share 15 Tweet 10
  • Reducing the Burden of Technology Transformation: Part One of a Three-Part Q&A Series

    20 shares
    Share 8 Tweet 5
  • Agencies Face Challenges in Identity Verification: Part 1 of the No Identity Left Behind Podcast

    31 shares
    Share 12 Tweet 8
  • Private Wireless Networks Support the Department of Defense’s Evolving Mission

    22 shares
    Share 9 Tweet 6

CONNECT WITH US

MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad MaaS Nebula Software Factory Banner Ad
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Ad Advertisement Banner Ad Advertisement Banner Ad
Advertisement Banner Advertisement Banner Advertisement Banner
Advertisement Banner Advertisement Banner Advertisement Banner

BECOME AN INSIDER

Get Government Technology Insider news and updates in your inbox.

Strategic Communications Group is a digital media company that helps business-to-business marketers drive customer demand through content marketing, content syndication, and lead identification.

Related Communities

Financial Technology Today
Future Healthcare Today
Modern Marketing Today
Retail Technology Insider
Today’s Modern Educator

Quick Links

  • Home
  • About
  • Contact Us

Become a Sponsor

Strategic Communications Group offers analytics, content marketing, and lead identification services. Interested?
Contact us!

© 2021 Strategic Communications Group, Inc.
Privacy Policy      |      Terms of Service

No Result
View All Result
  • Home
  • About Government Technology Insider
  • State & Local
  • Civilian
  • Defense & IC
  • Categories
    • Acquisition
    • AI & Data
    • Customer Experience
    • Cybersecurity
    • Digital Transformation
    • Hybrid Work
    • Public Safety
  • Contact Us