Close Menu

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    Honda CR-V Hybrid Lineup Expanded in Malaysia From RM178,200

    vivo V70 – Top 7 Flagship Features You Will Love

    Apple iPad Air with M4 Officially Launches in Malaysia From RM2,799

    Facebook X (Twitter) Instagram
    • Artificial Intelligence
    • Business Technology
    • Cryptocurrency
    • Gadgets
    • Gaming
    • Health
    • Software and Apps
    • Technology
    Facebook X (Twitter) Instagram Pinterest Vimeo
    Tech AI Verse
    • Home
    • Artificial Intelligence

      What the polls say about how Americans are using AI

      February 27, 2026

      Tensions between the Pentagon and AI giant Anthropic reach a boiling point

      February 21, 2026

      Read the extended transcript: President Donald Trump interviewed by ‘NBC Nightly News’ anchor Tom Llamas

      February 6, 2026

      Stocks and bitcoin sink as investors dump software company shares

      February 4, 2026

      AI, crypto and Trump super PACs stash millions to spend on the midterms

      February 2, 2026
    • Business

      Weighing up the enterprise risks of neocloud providers

      March 3, 2026

      A stolen Gemini API key turned a $180 bill into $82,000 in two days

      March 3, 2026

      These ultra-budget laptops “include” 1.2TB storage, but most of it is OneDrive trial space

      March 1, 2026

      FCC approves the merger of cable giants Cox and Charter

      February 28, 2026

      Finding value with AI and Industry 5.0 transformation

      February 28, 2026
    • Crypto

      Strait of Hormuz Shutdown Shakes Asian Energy Markets

      March 3, 2026

      Wall Street’s Inflation Alarm From Iran — What It Means for Crypto

      March 3, 2026

      Ethereum Price Prediction: What To Expect From ETH In March 2026

      March 3, 2026

      Was Bitcoin Hijacked? How Institutional Interests Shaped Its Narrative Since 2015

      March 3, 2026

      XRP Whales Now Hold 83.7% of All Supply – What’s Next For Price?

      March 3, 2026
    • Technology

      Spotify’s new feature makes it easier to find popular audiobooks

      March 3, 2026

      This portable JBL Grip Bluetooth speaker is so good at 20% off

      March 3, 2026

      ‘AI’ could dox your anonymous posts

      March 3, 2026

      Microsoft says new Teams location feature isn’t for ’employee tracking’

      March 3, 2026

      OpenAI got ‘sloppy’ about the wrong thing

      March 3, 2026
    • Others
      • Gadgets
      • Gaming
      • Health
      • Software and Apps
    Check BMI
    Tech AI Verse
    You are at:Home»Technology»NSA urges continuous checks to achieve zero trust
    Technology

    NSA urges continuous checks to achieve zero trust

    TechAiVerseBy TechAiVerseJanuary 17, 2026No Comments4 Mins Read4 Views
    Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Reddit
    NSA urges continuous checks to achieve zero trust
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    NSA urges continuous checks to achieve zero trust

    The agency leading the US government’s cryptology and cyber security strategies has published its latest zero-trust guidance

    By

    • Cliff Saran,
      Managing Editor

    Published: 16 Jan 2026 12:32

    The US National Security Agency (NSA) has published its latest guidance on zero trust to secure US federal government IT networks and systems. This is the first of two guidance documents coming out of the NSA, providing “practical and actionable” recommendations that can be applied as best practice to secure corporate IT environments both in the public and private sectors.

    In the Zero trust primer document, the NSA defines a “zero-trust mindset”, which means assuming IT environment traffic, users, devices and infrastructure may be compromised. To achieve this, the guidance urges IT security teams to establish a rigorous authentication and authorisation process for all access requests.

    In the context of securing the integrity of government IT systems, it said that such a strategy enhances the security posture of networks by rigorously validating every access request, which prevents unauthorised changes, reduces risk of malicious code insertion, and ensures the integrity of software and supply chains

    The main takeaway from the NSA regarding zero trust is to never trust users or devices that request network connectivity or access to internal resources. The NSA guidance calls for verification without exception, where dynamic authentication and explicit approval is used across all activities on the network, adhering to the principle of least privilege.

    Specifically, the NSA’s latest guidance suggests that IT security teams should assume they are working in an IT environment where there is a breach, which means operating and defending resources under the assumption that an adversary already has a presence in the environment.

    The NSA said IT security teams should plan for deny-by-default and heavily scrutinise all users, devices, data flows and requests. This means that IT security teams need to log, inspect and monitor all configuration changes, resource accesses and environment traffic for suspicious activity continuously.

    The guidance also recommends explicit verification. This implies that access to all resources is consistently verified, using both dynamic and static mechanisms, which is used to derive what the NSA calls “confidence levels for contextual access decisions”.

    Commenting on the guidelines, zero-trust expert Brian Soby, CTO and co-founder of AppOmni, said: “Across the guidance, the emphasis is on continuous logging, inspection and monitoring of resource access and configuration change, plus comprehensive visibility across layers.

    “Read plainly, the NSA is suggesting that many programs are built around coarse checkpoints and limited signals, while the real risk lives inside enterprise applications, especially SaaS, where sensitive data and business workflows reside.”

    Soby’s understanding of the new guidelines is that effective zero trust requires a thorough understanding of what users can and cannot do, instead of simply relying on their ability to authenticate through network directory services and the authorisation that successful authentication gives them.

    “Many security programs still substitute directory groups and simplistic roles for true entitlement materiality, even though effective access in modern SaaS is shaped by application-native permissions, sharing rules, delegated administration, conditional controls and third-party OAuth grants.”

    He noted that the NSA’s emphasis on monitoring resource access and configuration change implies that relying on coarse identity abstractions leaves IT security teams blind to the actions and permission shifts that create exposure and enable misuse.

    “This gap also lines up uncomfortably well with the breaches and campaigns we are seeing now,” he added.

    As an example, Soby said that recent intrusions tied to groups tracked as UNC6040 and UNC6395 have highlighted how attackers can bypass traditional, frontdoor-centred controls by abusing SaaS identities and integrations, including compromised OAuth tokens and third-party application access, to reach and extract data from SaaS environments.

    “In that light, the NSA’s guidance supports a sharper conclusion: identity security programs that cannot truly understand user activities, behaviours and the materiality of entitlements inside applications do not match the principles of zero trust,” said Soby. “These often become more performative than effective, leaving security operations centre teams stuck with generic signals like logins when the meaningful attacker activity is happening inside the app.”

    Read more on Endpoint security


    • What the Latest Court Decisions Mean for the Federal IDR Process

      By: Jacqueline LaPointe


    • The Battle For Fair Reimbursement Under The No Surprises Act


    • HPE signs 10-year GreenLake HPC deal worth $2bn with US National Security Agency

      By: Caroline Donnelly


    • Security Think Tank: US security efforts may centre on collaboration

      By: Cath Goulding

    Share. Facebook Twitter Pinterest LinkedIn Reddit WhatsApp Telegram Email
    Previous ArticleDutch researcher’s AI breakthrough tackles the structured data paradox
    Next Article Mayor of London Sadiq Khan calls for urgent action to boost the capital’s AI workforce
    TechAiVerse
    • Website

    Jonathan is a tech enthusiast and the mind behind Tech AI Verse. With a passion for artificial intelligence, consumer tech, and emerging innovations, he deliver clear, insightful content to keep readers informed. From cutting-edge gadgets to AI advancements and cryptocurrency trends, Jonathan breaks down complex topics to make technology accessible to all.

    Related Posts

    Spotify’s new feature makes it easier to find popular audiobooks

    March 3, 2026

    This portable JBL Grip Bluetooth speaker is so good at 20% off

    March 3, 2026

    ‘AI’ could dox your anonymous posts

    March 3, 2026
    Leave A Reply Cancel Reply

    Top Posts

    Ping, You’ve Got Whale: AI detection system alerts ships of whales in their path

    April 22, 2025703 Views

    Lumo vs. Duck AI: Which AI is Better for Your Privacy?

    July 31, 2025286 Views

    6.7 Cummins Lifter Failure: What Years Are Affected (And Possible Fixes)

    April 14, 2025164 Views

    6 Best MagSafe Phone Grips (2025), Tested and Reviewed

    April 6, 2025124 Views
    Don't Miss
    Gadgets March 4, 2026

    Honda CR-V Hybrid Lineup Expanded in Malaysia From RM178,200

    Honda CR-V Hybrid Lineup Expanded in Malaysia From RM178,200 Honda Malaysia has officially launched the…

    vivo V70 – Top 7 Flagship Features You Will Love

    Apple iPad Air with M4 Officially Launches in Malaysia From RM2,799

    Apple Launches iPhone 17e in Malaysia from RM2,999

    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    About Us
    About Us

    Welcome to Tech AI Verse, your go-to destination for everything technology! We bring you the latest news, trends, and insights from the ever-evolving world of tech. Our coverage spans across global technology industry updates, artificial intelligence advancements, machine learning ethics, and automation innovations. Stay connected with us as we explore the limitless possibilities of technology!

    Facebook X (Twitter) Pinterest YouTube WhatsApp
    Our Picks

    Honda CR-V Hybrid Lineup Expanded in Malaysia From RM178,200

    March 4, 20262 Views

    vivo V70 – Top 7 Flagship Features You Will Love

    March 4, 20262 Views

    Apple iPad Air with M4 Officially Launches in Malaysia From RM2,799

    March 4, 20262 Views
    Most Popular

    7 Best Kids Bikes (2025): Mountain, Balance, Pedal, Coaster

    March 13, 20250 Views

    VTOMAN FlashSpeed 1500: Plenty Of Power For All Your Gear

    March 13, 20250 Views

    Best TV Antenna of 2025

    March 13, 20250 Views
    © 2026 TechAiVerse. Designed by Divya Tech.
    • Home
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions

    Type above and press Enter to search. Press Esc to cancel.