The Impact of Executive Order 14028 on FedRAMP

zero trust featured

Government responses to evolving security threats have, to more or less a degree, started to incorporate advanced mitigation postures that reflect a world of networked systems and complex digital supply chains. 

To address this changing landscape, the president issued Executive Order 14028, “Executive Order on Improving the Nation’s Cybersecurity.” This 2021 order introduced a zero-trust approach to security and stricter requirements for authorization processes and baseline requirements. 

This article will discuss how some aspects of this executive order are impacting or will impact, FedRAMP Authorization for cloud service offerings. 

 

Read More

The New FedRAMP Marketplace

FedRAMP Marketplace featured

On February 20th, the FedRAMP PMO announced the release of the newest design for the FedRAMP Marketplace. While this news doesn’t necessarily shake the foundations of government compliance, the Marketplace it is an essential resource for agencies looking for a trustworthy source of information regarding cloud providers.

In this article, we’ll break down what kind of information you can find in the new Marketplace and highlight why this resource is so vital for the health and performance of the program.

 

Read More

Are Man-in-the-Middle Attacks Still a Threat?

man-in-the-middle featured

Man-in-the-Middle attacks, where a malicious actor secretly intercepts and possibly alters the communication between two unsuspecting parties, have significantly escalated with digital connectivity and remote work surge. While the attack method is not new, its implications have grown in magnitude in the era of widespread digital transformation.

Modern businesses, from multinational corporations to small and medium enterprises, are constantly targeted by MitM attacks, often needing their knowledge. Consequently, vital data is compromised, financial losses are incurred, and trust is eroded. These scenarios underscore the urgency for organizations to understand and take preventative measures against MitM attacks.

This article discusses MitM attacks, how they operate, and why they’ve become a critical concern for contemporary businesses. We will also explore various preventive strategies organizations can deploy to safeguard against these invisible yet potent threats.

 

Read More