Intelligence Community News
Let’s take a look Zero Trust, and how a strategy based on its principles can help achieve security in a post-perimeter environment. In particular, we’ll address the NIST Special Publication on Zero Trust, and consider ways to implement an effective identity-centric Zero Trust architecture.