Introduction
For decades, cybersecurity in government has been defined by a familiar cycle: secure the perimeter, block the intruders, respond to the audits. That model no longer works. As adversaries grow more sophisticated and resources remain tight, the federal community needs a new mindset. Prevention still matters, but resilience must come first.
That shift from preventing every attack to assuming breach and planning for recovery is the essence of Zero Trust. It’s also the perspective I bring to my role at ColorTokens after more than 20 years in federal service, including time as Chief Information Security Officer (CISO) at the Department of the Interior (DOI).
Zero Trust as a Philosophy, Not a ...
The Voice of Cyber®
Zero Trust
Zero Trust is a cybersecurity framework that challenges the traditional perimeter-based security model by assuming that threats can originate from both external and internal sources. In a Zero Trust model, trust is never assumed, and strict access controls are implemented regardless of the user’s location, network, or device. The core principle of Zero Trust is to verify and authenticate every user, device, or application trying to access a network, even if they are already inside the organization’s perimeter.
Newest Release
No results found.
Deep Dive Articles
Sort By
- Date
- Title

As cyberattacks rise across Australia's critical infrastructure, from airlines to superannuation funds, a quiet storm is forming beneath the surface, not just in code or ...

“The cloud is just someone else’s computer,” goes the old tech joke, and like many good jokes, it conceals a sobering truth. For years, organizations eagerly adopted public ...
Introduction
Every day, critical industry sectors like healthcare, government and utilities services rely on digital systems that are mission-critical but vulnerable to ...

Introduction
On July 2, 2025, Qantas, Australia's flagship airline, disclosed a cyberattack that compromised the personal information of up to six million customers, first ...

Digital identity is now cybercriminals' top target. With data breaches up 78% globally, businesses must invest in Identity & Access Management to protect employees and ...

For decades, enterprises have invested billions into mastering the art of cybersecurity firewalls, antivirus programs, perimeter defenses, and compliance checklists. Many ...
No results found.
In The News
Sort By
- Date
- Title
SAN JOSE, Calif., September 11, 2025 — ColorTokens Inc., today announced the integration of its Xshield Enterprise Microsegmentation Platform™ with the CrowdStrike Falcon® ...
Veeam® Software, the #1 global leader by market share in Data Resilience, today announced the availability of its first fully pre-built, pre-hardened software appliance: the ...
Robust Identity Trifecta answers dynamic business needs within a centralised platform
Check Point’s Hybrid Mesh Security Platform recognised for plan to deliver AI-driven capabilities to automate network security functions
“Hospitals may have stronger defences, but attackers know the weak link often lies in the smaller, less protected third-party medical providers. Medical professionals running ...
SAN JOSE, Calif., May 8, 2025 – ColorTokens Inc., a leader in zero trust microsegmentation, today announced a powerful new integration with Nozomi Networks, the leader in OT ...
No results found.