Cybersecurity

Blog

Software Bill of Materials Simplified

A software vulnerability is released, are you affected? How do you know? In a world of increased vulnerability exposure and...

Blog

Highlights from Government Information, Strategy and Technology (GIST22)

At a time when it was still dicey as to whether people were ready to attend live events again, Swish took the lead and delivered...

Blog

Takeaways from Edge22 Security Summit | July 7-9, San Diego, California

After attending the Edge22 Security Summit, hosted by the Government Business Executive Forum (GBEF), I’m pleased to report...

Blog

"Networks" What you need to know, Zero Trust M-22-09

Networks In our fifth breakdown of the Networks Pillar requirements as outlined in M-22-09, we will discuss the pillar summary,...

Blog

"Applications and Workloads" What you need to know, Zero Trust M-22-09

Applications and Workloads In our fourth breakdown of the Applications and Workloads Pillar requirements as outlined in M-22-09,...

Blog

"Devices" What you need to know, Zero Trust M-22-09

Moving Beyond Compliance  Civilian Agencies have an opportunity to evolve their security capabilities beyond the compliance...

Blog

"Identity" What you need to know, Zero Trust M-22-09

In our first breakdown of the Identity Pillar requirements as outlined in M-22-09, we will discuss the pillar summary, necessary...

Blog

Zero Trust M-22-09: What you need to know

On January 26th, 2022 the Office of Management and Budget (OMB) released the latest Memo 22-09 tied to the Zero Trust strategy...

Blog

The VPN Exploitation Saga Continued

On April 20, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive (ED) 21-03 “....

Blog

Novel Approaches to Phishing and Risks to Corporate Data

Swish Data, a member of the Defense Industrial Base (DIB) and actively engaged in maintaining the highest level of organizational...