Blog Archive

Establishing a Zero Trust Environment

Introduction Zero Trust is a term that gets IT folk’s blood rushing with fantasies of playing with new tools and technologies that will once and forever solve all their cybersecurity problems. Implementing it may involve some new IT purchases, but

Read more »

Why Zero Trust is Necessary

As cyber threats evolve at an unprecedented rate, the importance of a Zero Trust (ZT) security model cannot be overstated. Zero Trust is not just a technology or a tool; it’s a comprehensive approach that demands collaboration across all departments,

Read more »

MITRE Breach: A Case for Zero Trust Architecture

As creators of the well-known ATT&CK framework, the MITRE name is synonymous with cybersecurity. On April 19, 2024, MITRE issued a news release stating that in January 2024, their Network Experimentation and Research Environment (NERVE) had been breached by a

Read more »

What is Zero Trust?

Introduction As information is increasingly accessible online, the number of cybersecurity attacks, threats, and breaches continue to grow. From hackers pretending to be someone else for financial gain to major companies falling victim to ransomware, being able to achieve cyber

Read more »

The case for FedRAMP to adopt a common OSCAL API Specification

The Federal Risk and Authorization Management Program (FedRAMP) program management office (PMO) recently published a request for quote (RFQ) for a governance risk and compliance (GRC) solution that intends to implement OSCAL (Open Security Controls Assessment Language) and facilitate compliance

Read more »

DevSecComp(liance)Ops with OSCAL

NIST’s held their 3rd Open Security Controls Assessment Language (OSCAL) Workshop earlier this month, and it was abundantly clear from the content and participation that the OSCAL standard and community has gained momentum and has a real opportunity to revolutionize

Read more »