ZERO TRUST
Humans May Be the Biggest Hurdle to Zero Trust
Automation is improving, but it’s not there yet. By Robert K. Ackerman
CISA Creating Zero-Trust Playbook for Government
Agencies may transition slowly to the new security principle. By George I. Seffers
Keylime Provides Root-of-Trust at Scale
The firmware zero-trust architecture is ready for prime-time, cloud-based deployment. By Kimberly Underwood
Pentagon Ponders Zero Trust Predicament
ICAM centralization may be the best option.
Zero Trust Brings Flexibility to Launch Enterprise
The architecture could alter how the U.S. Space Force manages launch ranges.
Applying Zero Trust to 5G Changes Networking
The two burgeoning technologies may be made for each other.
TACTICAL COMMUNICATIONS
Army Hones On-the-Move Communications
Commercial technologies form the backbone of new mobile connectivity.
SPECIAL INTEREST EDITORIAL
Q&A: The Importance of Dynamic Zero Trust for the DoD
DISRUPTIVE BY DESIGN
Named Data Networking and the Future of Combat Communications By Lt. Col. Ryan Kenny, USA
EXECUTIVE COMMENTARY
Changes Both Compel and Restrict Zero Trust By Brig. Gen. Paul Fredenburgh III, USA (Ret.)
AFCEA EDUCATIONAL ACTIVITIES
Recipient of Ciena STEM Teacher Grant Helps Children Learn Coding
ON POINT
Q&A With David Benhaim