Zero trust is a security paradigm whose fundamental philosophy is that every access to a resource must be explicitly verified, without assuming trust based on origin or identity. In a federated environment composed of multiple domains, ensuring zero trust guarantees for accessing shared resources is a challenge, as information on requesters is generated by their originating domain, yet requires explicit verification from the domain owning the resource.
Federal Executive Forum Secure Cloud Computing Strategies in Government Progress and Best Practices 2025
Cloud technology continues to play an integral role in driving innovation at federal agencies. As use cases become increasingly complex, how can agencies ensure data is secured?
During this webinar, you will gain the unique perspective of top federal technology experts:
May 20, 2025 1:00 p.m. ET
China has stopped exporting rare earths to everyone, not just the U.S., cutting off critical materials for tech, autos, aerospace, and defense
After Trump unveiled his “Liberation Day” tariffs on April 2, China retaliated on April 4 with its own duties as well as export controls on several rare earth minerals and magnets made from them.
So far, those export controls have translated to a halt across the board, cutting off the U.S. and other countries, according to the New York Times.
Accelerate Together: Zero Trust 2025
During this one-day event, technology and systems engineering leaders from AWS and its partners will detail the ways their tools help agencies solve those challenges in tandem.
Apr 10, 2025 1:00 p.m. ET
Webinar
Zero Trust Privacy Assessment and Guidance
This publication provides guidance on how to use Zero Trust in privacy implementation. It highlights the core principles of privacy and how they can align with a Zero Trust architecture, touching on privacy impact assessments (PIAs) as well.
As the world increasingly digitizes, these recommendations become all the more critical. They aren’t just about protecting privacy. Zero Trust ensures that organizations identify, locate, process, and dispose of such data with the right level of security.
Warning Against Phishing Emails Distributing GuLoader Malware by Impersonating a Famous International Shipping Company
AhnLab SEcurity intelligence Center (ASEC) recently identified the distribution of GuLoader malware via a phishing email by impersonating a famous international shipping company. The phishing email was obtained through the email honeypot operated by ASEC. The mail body instructs users to check their post-paid customs tax and demands them to open the attachment.
Space supply chain gaps: Propulsion, hardened electronics and laser links
Despite ongoing efforts by the Defense Department to bolster the space supply chain, government and commercial satellite programs continue to struggle with shortfalls in several critical areas, including on-orbit propulsion, optical communications terminals and hardened electronics, according to industry and Pentagon officials.
US congressional panel urges Americans to ditch China-made routers
A U.S. congressional committee on Wednesday urged Americans to remove Chinese-made wireless routers from their homes, including those made by TP-Link, calling them a security threat that opened the door for China to hack U.S. critical infrastructure. The House of Representatives Select Committee on China has pushed the Commerce Department to investigate China’s TP-Link Technology Co, which according to research firm IDC is the top seller of WiFi routers internationally by unit volume.
nRootTag: 1.5 Billion iPhones Used for Malicious Tracking
According to the researchers, a complete fix could take several years, as Apple would need to update all Find My-compatible devices, including iPhones and other connected hardware. However, even after the necessary firmware updates are released, adoption may be slow, as not all users immediately upgrade their devices.
OSINT Unveiled: The Technology Behind the Intelligence – ODNI Edition
Feb 27, 2025 2:00 p.m. ET – Webinar
Join us for a discussion on the evolving role of OSINT in national security. As hybrid threats grow more complex, Open-Source Intelligence (OSINT) is becoming a critical tool for government agencies and private sector partners. Our speakers will explore OSINT’s integration with other intelligence disciplines, the importance of public-private collaboration and the steps needed to professionalize the field.
Key Topics:
- The role of OSINT in today’s hybrid threat landscape
- Steps to advance OSINT professionalization in government
- The importance of public-private partnerships in intelligence
- How OSINT complements SIGINT, HUMINT, GEOINT and MASINT
- The significance of direct OSINT collection for government and industry