Federal agencies are looking for advanced cybersecurity strategies, including implementing a Zero Trust approach, to combat the increase in malware attacks and meet the requirements of the Biden Administration’s Executive Order on Cybersecurity. With a Zero Trust approach, agencies are able to monitor users on their networks closely and control access with much more granularity.
CTO of Homeland Security and CISOs from Navy and Customs and Border Protection Discuss Zero Trust Network Implementation
The switch to the remote work environment because of the COVID-19 pandemic necessitated agencies focusing on their cybersecurity strategies. As a result, the implementation of Zero Trust Architecture became a top priority for agencies. Zero Trust assures that the users connecting to an agency’s network only receive access to what they need and nothing more. “Zero Trust can help increase capabilities while also reducing risk,” said Brian Campo, Deputy CTO, Department of Homeland Security.
Read the full story here.
Zero Trust-Like Approach Needed for Microelectronics Industry, Former DoD Official Says
Lisa Porter, who previously served as the first director of the Intelligence Advanced Research Projects Activity, commented that the U.S. should take an approach to shore up the microelectronics supply chain akin to the Zero Trust model for cybersecurity rather than overemphasize onshoring and subsidizing. Officials are debating how to respond to the global chip shortage while assuring that the technology is available and secure. Porter recommends that the U.S. take on a Zero Trust approach for microelectronics.
Read the full story here.
Securing Data in a Multi-Cloud Environment: The Value of a Zero Trust Approach
Over the past two years, there have been several malware attacks, such as the SolarWinds hack and the ransomware attack on the Colonial Pipeline. On May 12, 2021, President Biden issued an Executive Order (EO) on cybersecurity that outlines a new course for national cybersecurity and the protection of federal government agencies. Increasingly, agencies are implementing a Zero Trust approach into their cybersecurity strategies. Zero Trust works with existing security infrastructure. “With a traditional network defense posture, once a user was validated, they were free to move about the network. But with a Zero Trust posture, not only can I decide if I’m going to let you into the network, but I can then decide where you have permission to go and what you can access. Zero Trust provides a much more granular level of control,” said Cameron Chehreh, Federal Chief Technology Officer at Dell Technologies
Read the full story here.