Cybersecurity

Blog

"Applications and Workloads" What you need to know, Zero Trust M-22-09

Applications and Workloads In our fourth breakdown of the Applications and Workloads Pillar requirements as outlined in M-22-09,...

Blog

Zero Trust M-22-09: What you need to know

On January 26th, 2022 the Office of Management and Budget (OMB) released the latest Memo 22-09 tied to the Zero Trust strategy...

Blog

The VPN Exploitation Saga Continued

On April 20, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive (ED) 21-03 “....

Blog

Novel Approaches to Phishing and Risks to Corporate Data

Swish Data, a member of the Defense Industrial Base (DIB) and actively engaged in maintaining the highest level of organizational...

Blog

The Journey to a Zero Trust Architecture

Zero Trust is not a single architecture nor solely a property of a cybersecurity-based product. Identifying the gaps in the...