Rethinking Zero Trust in the Age of Digital Warfare
Date:
Thu, 02 Apr 2026 10:00:06 +0000
Description:
Why defense agencies must go beyond Zero Trust to share intelligence at mission speed.
FULL STORY ======================================================================Copy link Facebook X Whatsapp Reddit Pinterest Flipboard Threads Email Share this article 0 Join the conversation Follow us Add us as a preferred source on Google Newsletter Tech Radar Pro Are you a pro? Subscribe to our newsletter Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed! Become a Member in Seconds Unlock instant access to exclusive member features. Contact me with news and offers from other Future brands Receive email from us on behalf of our trusted partners or sponsors By submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over. You are
now subscribed Your newsletter sign-up was successful Join the club Get full access to premium articles, exclusive features and a growing list of member rewards. Explore An account already exists for this email address, please log in. Subscribe to our newsletter For over 16 years, the Zero Trust cybersecurity model has upheld the principle of never trust, always verify
and has become the universal standard across government and defense organizations.
But Zero Trust Access wasnt built with Cross Domain Transfer secure, policy-enforced data transfer between networks with varying security classifications in mind. Thats an issue, as modern cyber warfare runs on speedy intelligence sharing, quick coalition tempo and data-driven decision advantage. Article continues below You may like Data sovereignty creates an illusion of security: the real battle is software integrity Why silence is no longer a security strategy Proof over promises: a new doctrine for cybersecurity Petko Stoyanov Social Links Navigation
Chief Technology Officer, Everfox. Given this, its no surprise that more and more cyber leaders are recognizing that Zero Trust alone cannot secure operations that span multiple classification levels and allied nation environments.
A new strategic foundation to both enable and secure the flow of mission-critical information is taking shape. Why cross-domain data sharing matters In todays high-octane international cyber battlespace, government and defense alliances such as NATO and operational initiatives such as the U.S. Combined Joint All-Domain Command and Control (CJADC2) are facing a complex problem.
As attack volumes increase, the ability to move data securely across domains and allies at mission speed for defense agencies to triage and respond
becomes more crucial. At the same time, sharing and accessing sensitive data is a major operational risk for organizations at the frontlines of national security. Are you a pro? Subscribe to our newsletter Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed! Contact me with news and offers from other Future brands Receive email from us on behalf of our trusted partners or sponsors By submitting your information you agree to the Terms & Conditions and Privacy Policy and are aged 16 or over.
This conundrum requires more than Zero Trust Access to solve. Zero trust treats all network traffic as a potential breach and ensures that no users or systems are trusted by default. This suits securing IT infrastructure , but
is less suited to data, especially when it comes to securing data thats in transit.
Current conflicts demand fast, coalition-wide data sharing across
multi-domain environments, such as land, cyber and cloud computing , in near real-time. In these environments, latency is not an inconvenience; it is an operational vulnerability that a sole reliance on Zero Trust opens the door to. The sleepwalking risk When weighing up how a sole reliance on Zero Trust causes problems, we need to consider wider factors that could contribute to a disastrous cyber security breach or lapse of cyber defenses. Without specialist mechanisms for data security and secure data exchange, national security agencies face a quiet, compounding erosion of operational tempo.
What to read next Data sovereignty: an existential issue for nations and enterprises Data sovereignty: not just an issue for governments Beyond the spike: building resilient and trusted infrastructure in an era of sustained attacks
Data cant move at mission speed, decision latency is the norm and
intelligence gets stuck at classification boundaries awaiting manual
transfer.
This can be seen as an internal friction for security agencies, but that
risks downplaying how modern cyber warfare works in practice. Defense initiatives are predicated on the assumption that partners can share intelligence securely and at pace.
An organization that hasn't solved cross-domain data flow doesn't just put
its own mission at risk; it degrades the collective tempo and trust of the entire coalition.
Shared identity frameworks and federated access policies across systems and partners alike have to be part of the solution. In a recent Everfox study,
64% of security leaders said they believe that secure data movement is the greatest barrier to achieving effective Zero Trust strategies.
In other words, Zero Trust environments struggle not because verification is unnecessary, but because verification alone does not solve cross-domain data orchestration. And when Zero Trust is implemented in isolation, it makes it harder to share data securely and collaborate. The value of trust To be battle-ready, national security organizations need to adopt a cohesive architecture that remedies these problems with data sharing at mission-speed and across multiple domains, partners and classification levels.
The solution is a data-centric model which applies security controls directly to data itself. This isnt hypothetical. The aforementioned study found that nine in ten have adopted or are in the process of implementing a data-centric security approach.
What does this look like in practice? It entails integrating three
frameworks: Zero Trust Architecture (ZTA), Data Centric Security (DCS) and Cross Domain Solutions (CDS). Each framework brings a key strength: ZTA provides continuous verification (the need for which is never going away),
DCS applies security controls to data so intelligence can move securely
across networks despite any variation in classification or trust level and
CDS facilitates secure data exchange without compromising speed.
Together, this integrated architecture shifts security from static perimeter enforcement to dynamic, policy-driven data mobility, laying the groundwork
and equipping organizations with the foundational tools for navigating the digital battlespace.
When deployed in concert, these frameworks shorten decision cycles and accelerate information exchange without diluting governance controls. Where transformation begins Zero Trust is an essential principle in government and defense organizations, but it often falls short in sharing data at mission speed. In modern conflict, battles are increasingly fought through digital networks where data is the decisive asset.
Navigating the digital battlespace requires the seamless movement of secure information across domains, and a sole reliance on Zero Trust doesnt help to hit that requirement.
By complementing Zero Trust principles with DCS and CDS, national security organizations can usher in a new era of data-centric security based on the agility that modern mission success demands. Check our list of the best data recovery services.
======================================================================
Link to news story:
https://www.techradar.com/pro/rethinking-zero-trust-in-the-age-of-digital-warf are
--- Mystic BBS v1.12 A49 (Linux/64)
* Origin: tqwNet Technology News (1337:1/100)