Cybersecurity

Blog

Key Takeaways from the MGM Hack

On September 11, 2023, MGM Resorts, one of the largest casino operators in the world, suffered a ransomware attack causing...

Blog

Navigating OMB M-21-31 72-Hour PCAP Requirements

Is your federal agency confused and wondering how you are going to meet the 72-hour Packet Capture (PCAP) requirements outlined...

Blog

Software Bill of Materials Simplified

A software vulnerability is released. Are you affected? How do you know? In a world of increased vulnerability exposure and...

Blog

"Applications and Workloads" What you need to know, Zero Trust M-22-09

Applications and Workloads In our fourth breakdown of the Applications and Workloads Pillar requirements as outlined in M-22-09,...

Blog

Zero Trust M-22-09: What you need to know

On January 26th, 2022 the Office of Management and Budget (OMB) released the latest Memo 22-09 tied to the Zero Trust strategy...

Blog

The VPN Exploitation Saga Continued

On April 20, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive (ED) 21-03 “....

Blog

Novel Approaches to Phishing and Risks to Corporate Data

Swish Data, a member of the Defense Industrial Base (DIB) and actively engaged in maintaining the highest level of organizational...

Blog

The Journey to a Zero Trust Architecture

Zero Trust is not a single architecture nor solely a property of a cybersecurity-based product. Identifying the gaps in the...