{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreiglicnfeboqhyiu4k6mcq6wdokbgeh7vk7ua663vp3z7prelcyuzy",
"uri": "at://did:plc:klkgxrhct7epqznuvf6tawoy/app.bsky.feed.post/3mfqmfujc6mt2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreiftbjcrbzs3j7hcxiq7eghgjiftloqmkjsz5jxgkkhakkooslmoti"
},
"mimeType": "image/jpeg",
"size": 95112
},
"path": "/commentary/2026/02/five-stages-to-secure-military-operational-technology-using-zero-trust-and-risk-operations-centers/",
"publishedAt": "2026-02-25T20:02:03.000Z",
"site": "https://federalnewsnetwork.com",
"tags": [
"Commentary",
"Cybersecurity",
"Defense",
"Defense Industry",
"IT Modernization",
"Technology",
"Agentic AI",
"Billington Cybersecurity Summit",
"Defense Department",
"Jonathan Trull",
"operational technology",
"Qualys",
"zero trust"
],
"textContent": "As adversaries continue targeting critical U.S. infrastructure, DoD officials must continue to drive a proactive approach to zero trust and OT security.",
"title": "Five stages to secure military operational technology using zero trust and risk operations centers"
}