FedScoop: Zero trust architecture is becoming more popular in the Department of Defense and will now serve as a model for how the military will field microelectronics.
Zero trust security relies on continuous validation for access as a user moves around a network regardless of their physical location and relationship to an organization, instead of a one-and-done security check like the normal username and password. In essence, it gives users or other device personas accessing a network “zero trust” as it connects to a network.
The most significant government policy, business, and technology news and analysis delivered to your inbox.
Subscribe Nowi360Gov is an intelligent network of websites and e-newsletters that provides government business, policy and technology leaders with a single destination for the most important news and analysis regarding their agency strategies and initiatives.
Telephone: 202.760.2280
Toll Free: 855.i360.Gov
Fax: 202.697.5045
The most significant government policy, business, and technology news and analysis delivered to your inbox.
Subscribe Now