Cybersecurity

Blog

Password Management The Weakest Link

October is Cybersecurity Awareness Month, a time when we remind ourselves of the digital dangers that lurk in the shadows...

Blog

Key Takeaways from the MGM Hack

On September 11, 2023, MGM Resorts, one of the largest casino operators in the world, suffered a ransomware attack causing...

Blog

Navigating OMB M-21-31 72-Hour PCAP Requirements

Is your federal agency confused and wondering how you are going to meet the 72-hour Packet Capture (PCAP) requirements outlined...

Blog

SBOM Applied for Enterprise

Introduction Software Bill of Materials (SBOM) requirements are becoming increasingly important for government agencies as...

Blog

Software Bill of Materials Simplified

A software vulnerability is released. Are you affected? How do you know? In a world of increased vulnerability exposure and...

Blog

Highlights from Government Information, Strategy and Technology (GIST22)

At a time when it was still dicey as to whether people were ready to attend live events again, Swish took the lead and delivered...

Blog

Takeaways from Edge22 Security Summit | July 7-9, San Diego, California

After attending the Edge22 Security Summit, hosted by the Government Business Executive Forum (GBEF), I’m pleased to report...

Blog

"Networks" What you need to know, Zero Trust M-22-09

Networks In our fifth breakdown of the Networks Pillar requirements as outlined in M-22-09, we will discuss the pillar summary,...

Blog

"Applications and Workloads" What you need to know, Zero Trust M-22-09

Applications and Workloads In our fourth breakdown of the Applications and Workloads Pillar requirements as outlined in M-22-09,...

Blog

"Devices" What you need to know, Zero Trust M-22-09

Moving Beyond Compliance  Civilian Agencies have an opportunity to evolve their security capabilities beyond the compliance...