Search Results for "" Zero Trust ""
Not finding what you’re looking for?
10 of 71 Results
DISA's Zero-Trust Transformation Takes Major Step Forward
Officials announce DISA's Thunderdome architecture demonstrated overwhelming success during testing exercises.
Image
Zero Trust Data Is Key To Unlocking IoT’s Potential
This is the second of four articles on the Internet of Things (IoT) written by AFCEA’s Technology Committee. The first explains how the U.S. military can leverage dedicated IoT solutions. This article outlines some of the best practices for IoT security. The next article will focus on use cases and operational issues related to the use of IoT in the civilian and military sectors.
Image

Zero Trust Will Require a Paradigm Shift
DoD information officers discuss the military’s challenges as it shifts to zero-trust principles.
Image
DOD To Begin Reviewing Zero Trust Implementation Plans Next Week
Randy Resnick offers a peek behind the zero-trust curtain.
Image

Emerging Cybersecurity Challenges from AI-Powered Threats
Growing online attack surfaces, AI-fueled threats, and international cooperation reshape cyber defense amid the Ukraine crisis.
Image

Revolutionizing Operations: Data-Centric Plans, AI and Tech Concerns Revealed
The Army's data-driven transformation emphasizes cybersecurity, hardware protection and AI integration.
Image
Zero Trust: the Evolution Toward Enhanced Cybersecurity
The Department of Defense prioritizes zero-trust principles, emphasizing culture, communication and cloud migration for improved security.
Image
Scaling the Defense Frontier: DISA's Vision for a Secure and Agile Digital Future
The agency oversees global defense networks, emphasizing scalability, simplicity, data protection and partnerships for readiness from headquarters to the edge.
Image
DISA Completes Thunderdome Zero-Trust Project
The agency will soon seek production approval.
Image

Army To Analyze Zero Trust Gaps in Tactical and Classified Networks
The service’s new zero trust management office makes rapid headway, according to Ronald Pontius, the deputy to the commanding general at Army Cyber Command.
Image
