A Look at the Computer Security Act of 1987

U.S. Federal Cybersecurity Today Computer security regulations have come a long way from their early beginnings.  Even before the Federal Information Security Management Act (FISMA), there was the Computer Security Act of ...
Election Security: Defending our Democracy against Well-Resourced Adversaries

ON-DEMAND Webinar: Election Security: Defending our Democracy against Well-Resourced Adversaries [Video]

Adversaries have an interest in influencing the U.S. electoral process. What happens in America impacts the political and economic climate around the world ...
Feds Propose ‘911’ Emergency Call for Reporting Security Flaws; Experts Warn It’s Easier Said Than Done

Feds Propose ‘911’ Emergency Call for Reporting Security Flaws; Experts Warn It’s Easier Said Than Done

CISA drafts directive to create a vulnerability disclosure policy for government websites and apps Agency seeks to centralize the effort via a standard vulnerability disclosure platform service next spring Cybersecurity veteran Katie ...

ExpertOps Federal: Managed Services in a FedRAMP Certified Cloud Has Arrived

According to its own website, FedRAMP serves three different of partners: federal agencies, Cloud Service Providers (CSP) and third-party assessment organizations. This article will focus on CSPs and how a good CSP ...
CMMC: Still on Track?

CMMC: Still on Track?

The Cybersecurity Maturity Model Certification (CMMC) program is aiming to shore up cybersecurity among defense contractors. Is it still on track? An update ...
DoD: Mission Execution from Home

DoD: Mission Execution from Home

Enhanced CAC/PIV card capabilities with Silo for Safe Access: How Authentic8 is partnering with the Department of Defense to ensure security and maintain productivity when government employees work from home ...
COVID-19 and Remote Work: Crisis & Opportunity

COVID-19 and Remote Work: Crisis & Opportunity

Remote work has gone from”nice to have” to “must do” in a matter of days for many, due to the COVID-19 pandemic. Historically, the federal government and especially the Department of Defense ...
The Next Evolution of Cyber Threat Intelligence

What’s Next in Cyber Threat Intelligence?

Video: Jake Williams (SANS & Rendition InfoSec) shares his thoughts about the future of Cyber Threat Intelligence (CTI) and OSINT collection. (Authentic8) ...
5 Must-Reads for CMMC Insight

5 Must-Reads for CMMC Insight

Reviewed: Resources that can help your company get a head start with CMMC, the Department of Defense's new contractor requirements. (Authentic8 Blog) ...
Authentic8 Completes FedRAMP ‘In Process’ Authorization Milestone

Authentic8 Completes FedRAMP ‘In Process’ Authorization Milestone

Authentic8, maker of Silo, the leading web isolation platform for commercial and government organizations, is now 'In Process' for FedRAMP authorization ...