Introduction
For decades, cybersecurity in government has been defined by a familiar cycle: secure the perimeter, block the intruders, respond to the audits. That model no longer works. As adversaries grow more sophisticated and resources remain tight, the federal community needs a new mindset. Prevention still matters, but resilience must come first.
That shift from preventing every attack to assuming breach and planning for recovery is the essence of Zero Trust. It’s also the perspective I bring to my role at ColorTokens after more than 20 years in federal service, including time as Chief Information Security Officer (CISO) at the Department of the Interior (DOI).
Zero Trust as a Philosophy, Not a ...
The Voice of Cyber®
TECHNOLOGY
Newest Release
No results found.
Deep Dive Articles
Sort By
- Date
- Title

Introduction
Cybercrime in Australia is rising rapidly. From the major breachers that held headlines hostage for months, to government agencies and critical infrastructure ...

As cyber threats and disruptions grow, organisations must make data resilience a core component of their IT strategy to ensure business continuity and safeguard critical data.

Australia’s corporate leaders are sleepwalking into a technology blind spot that will cost them dearly. Shadow AI is already entrenched in workplaces, and boards that treat ...

Collaborative action from individuals, businesses and the government is more important than ever, as scams become more sophisticated.

AI has been making waves for years now. It has moved from the pages of science fiction into the control rooms of our defence and security agencies and critical ...

Introduction
Businesses are creating and launching software faster than ever to keep pace with competitors and drive innovation. The focus on increased speed has created a ...
No results found.
In The News
Sort By
- Date
- Title
With a wave of new capabilities, SailPoint sets the direction for unifying identity, data and security with design partners CVS, Equinix, NVIDIA, VSP, and more
New milestone affirms Dynatrace ability to deliver enterprise-grade observability for generative AI applications on AWS
Streamlined deployment and seamless integration of pre-validated solutions
Customers get accelerated access to CyberArk’s trusted, innovative identity security ...
Delivering new capabilities in cloud, non-employee risk management, machine identity, and connectivity to strengthen enterprise identity security
The only unified platform for AI agent systems, enabling more accurate, real-time response against AI-driven threats
Building on February’s partnership announcement, Check Point and Wiz unveil unified Cloud Security Solution with Real-Time Visibility and AI-Powered Prevention
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- 32
- 33
- 34
- 35
- 36
- 37
- 38
- 39
- 40
- 41
- 42
- 43
- 44
- 45
- 46
- 47
- 48
- 49
- 50
- 51
- 52
- 53
- 54
- 55
- 56
- 57
- 58
- 59
- 60
- 61
- 62
- 63
- 64
- 65
- 66
- 67
- 68
- 69
- 70
- 71
- 72
- 73
- 74
- 75
- 76
- 77
- 78
- 79
- 80
- 81
- 82
- 83
- 84
- 85
- 86
- 87
- 88
- 89
- 90
- 91
- 92
- 93
- 94
- 95
- 96
- 97
- 98
- 99
- 100
- 101
- 102
- 103
- 104
- 105
- 106
- 107
- 108
- 109
- 110
- 111
- 112
- 113
- 114
- 115
- 116
- 117
- 118
- 119
- 120
- 121
- 122
- 123
- 124
- 125
- 126
- 127
- 128
- 129
- 130
- 131
- 132
- 133
- 134
- 135
- 136
- 137
- 138
- 139
- 140
- 141
- 142
- 143
- 144
- 145
- 146
- 147
- 148
- 149
- 150
- 151
- 152
- 153
- 154
- 155
- 156
- 157
- 158
- 159
- 160
- 161
- 162
- 163
- 164
- 165
- 166
- 167
- 168
- 169
- 170
- 171
- 172
- 173
- 174
- 175
- 176
- 177
- 178
- 179
- 180
- 181
- 182
- 183
- 184
- 185
- 186
- 187
- 188
- 189
- 190
- 191
- 192
- 193
- 194
- 195
- 196
- 197
- 198
- 199
- 200
- 201
- 202
- 203
- 204
- 205
- 206
- 207
- 208
- 209
- 210
- 211
- 212
- 213
- 214
- 215
- 216
- 217
- 218
- 219
- 220
- 221
- 222
- 223
No results found.