Cybersecurity

Blog

"Networks" What you need to know, Zero Trust M-22-09

Networks In our fifth breakdown of the Networks Pillar requirements as outlined in M-22-09, we will discuss the pillar summary,...

Blog

"Applications and Workloads" What you need to know, Zero Trust M-22-09

Applications and Workloads In our fourth breakdown of the Applications and Workloads Pillar requirements as outlined in M-22-09,...

Blog

"Devices" What you need to know, Zero Trust M-22-09

Moving Beyond Compliance  Civilian Agencies have an opportunity to evolve their security capabilities beyond the compliance...

Blog

"Identity" What you need to know, Zero Trust M-22-09

In our first breakdown of the Identity Pillar requirements as outlined in M-22-09, we will discuss the pillar summary, necessary...

Blog

Zero Trust M-22-09: What you need to know

On January 26th, 2022 the Office of Management and Budget (OMB) released the latest Memo 22-09 tied to the Zero Trust strategy...

Blog

The VPN Exploitation Saga Continued

On April 20, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive (ED) 21-03 “....

Blog

Novel Approaches to Phishing and Risks to Corporate Data

Swish Data, a member of the Defense Industrial Base (DIB) and actively engaged in maintaining the highest level of organizational...

Blog

The Journey to a Zero Trust Architecture

Zero Trust is not a single architecture nor solely a property of a cybersecurity-based product. Identifying the gaps in the...