Cybersecurity

Blog

Agentic AI in Government: Navigating the New Frontier

Over the years working in government IT, I’ve often had to temper the excitement that accompanies emerging technologies...

Blog

Key Takeaways from the MGM Hack

On September 11, 2023, MGM Resorts, one of the largest casino operators in the world, suffered a ransomware attack causing...

Blog

Navigating OMB M-21-31 72-Hour PCAP Requirements

Is your federal agency confused and wondering how you are going to meet the 72-hour Packet Capture (PCAP) requirements outlined...

Blog

Software Bill of Materials Simplified

A software vulnerability is released. Are you affected? How do you know? In a world of increased vulnerability exposure and...

Blog

"Applications and Workloads" What you need to know, Zero Trust M-22-09

Applications and Workloads In our fourth breakdown of the Applications and Workloads Pillar requirements as outlined in M-22-09,...

Blog

Zero Trust M-22-09: What you need to know

On January 26th, 2022 the Office of Management and Budget (OMB) released the latest Memo 22-09 tied to the Zero Trust strategy...

Blog

The VPN Exploitation Saga Continued

On April 20, 2021, the Cybersecurity and Infrastructure Security Agency (CISA) issued Emergency Directive (ED) 21-03 “....

Blog

Novel Approaches to Phishing and Risks to Corporate Data

Swish Data, a member of the Defense Industrial Base (DIB) and actively engaged in maintaining the highest level of organizational...

Blog

The Journey to a Zero Trust Architecture

Zero Trust is not a single architecture nor solely a property of a cybersecurity-based product. Identifying the gaps in the...