Devo Achieves ATO, and Federal CISOs Gain Another Key Resource
Of all the SaaS tools used by federal IT teams, cutting-edge cybersecurity tools may be the ones in highest demand. In July 2023 a number of US agencies – including the Department of Energy and the US Office of Personnel Management – were victims of a debilitating attack by the ... Read More
Seeking SaaS: FedRAMP Launches Modernization and 10X Increase
At the end of October, the federal Office of Management and Budget (OMB) released a draft memorandum for public comment titled Modernizing the Federal Risk Authorization Management Program (FedRAMP). For the people and teams that live, breathe and eat FedRAMP every day, this became BIG news overnight. OMB proposed to ... Read More
Ripcord Transforms, Anitian Empowers, Agencies Win
As far back as 2011 a presidential mandate said, “Records are the foundation of open government.” This mandate went on to say that accessible, readable public records supported the “principles of transparency, participation, and collaboration” in society, as well as a government’s march towards progress and efficiency. It’s almost impossible ... Read More
Revving Up for Rev5, Part 3: Recommendations and Timelines
FedRAMP R5 represents a lot of change. So much change that we can’t track it all in this one blog, though we gave it the Old College Try: In this last installment of the series we’ll serve up recommendations and tips from Anitian’s on-staff security and compliance experts about how to navigate the ... Read More
Revving Up for Rev5, Part 3: Recommendations and Timelines
The post Revving Up for Rev5, Part 3: Recommendations and Timelines appeared first on Anitian ... Read More
Revving Up for Rev5, Part 2: SCRM, Privacy and Encryption
The post Revving Up for Rev5, Part 2: SCRM, Privacy and Encryption appeared first on Anitian ... Read More
Revving Up for Rev5: When Threats Evolve, FedRAMP Must Evolve
The post Revving Up for Rev5: When Threats Evolve, FedRAMP Must Evolve appeared first on Anitian ... Read More
New Report Highlights a Supply Chain Gap in Firmware
Supply chain attacks are a leading concern for cybersecurity teams in all sectors and verticals. One of the ways to defeat them is to fortify the firmware these attacks so often rely on…. but before that can happen we have to look with objective eyes at What we know, What ... Read More
Pulse Secure: When Your Defenses Are Turned Against You
Vulnerabilities in enterprise network and security devices are being aggressively targeted by APT and ransomware threat actors as initial access vectors into enterprises. Pulse Secure VPN devices have proven to be the most popular targets, and their ongoing exploitation highlights how devices that were intended to defend the network are ... Read More
Protecting Your Fortinet Devices With Firmware Security
Vulnerabilities in enterprise network and security devices are being aggressively targeted by APT and ransomware threat actors as initial access vectors into enterprises. Fortinet products are a prime example of this trend and highlight how devices that were intended to defend the network are increasingly being exploited to cause damage ... Read More