Zero Trust: What is it Really, and Why Should You Care?

The old saying goes, there are only two kinds of organizations: those that have been breached and those that will be soon. Clearly, the “moat-and-castle” approach to security has not worked. Simply being “inside” a network – behind a firewall, DMZ and other traditional defenses – does not confer trustworthiness, whether it’s a device, a user, network traffic, or an application.

TIC 3.0: Great Work, but Not Zero Trust

DHS recently published version 3.0 of the Trusted Internet Connection (TIC) architecture. A response to changing IT conditions, Executive Orders, and OMB mandates, the new architecture seeks to support IT modernization through cloud adoption while keeping security as a top priority. The comprehensive set of documents includes an overview, a catalog of security capabilities, a reference architecture, guidance for pilot programs, advice for service providers, and a very helpful set of use cases relevant to agency needs.

2020 Cloud Trends for the Public Sector

Hot off the heels of last week’s Amazon Web Services re:Invent conference, we sat down with DLT’s Chief Technology Officer, David Blankenhorn, to discuss the current state of the Cloud and what drivers will fuel more innovation and adoption for the U.S. public sector in 2020.

There have been a few big agenda items for the cloud community to digest this year – what is the current state of U.S. public sector cloud adoption and usage?