Seven Steps to Achieving Security with Zero Trust
Seven Steps to Achieving Security with Zero Trust Seven Steps to Achieving Security with Zero Trust If there are two words federal cybersecurity experts hear most frequently today, they are probably “zero trust.” Not only are there plenty of mandates and other requirements to move in that direction, but there are practical reasons as well. […]
Federal Zero Trust Strategy: OMB M-22-09 sets new goals
Federal Zero Trust Strategy: OMB M-22-09 sets new goals Federal Zero Trust Strategy: OMB M-22-09 sets new goals The Cybersecurity Executive Order requires every federal agency to adopt zero trust, and OMB published an updated Federal Zero Trust Strategy in Memorandum M-22-09. It outlines three Identity goals that every agency must achieve by the end […]
Zero Trust Begins with Identity
Zero Trust Begins with Identity Zero Trust Begins with Identity The Cybersecurity Executive Order requires every federal agency to adopt zero trust, and the CISA Zero Trust Maturity Model aids the transition. It shows five pillars of zero trust, and the first is Identity. Learn why zero trust begins with identity, and how to quickly […]