UberEther Blog
DoD Workload Identity Requirements for NPEs
Strengthening DoD Workload Requirements for NPEs: An Essential Overview Hey folks, let’s dive right into the world of identity and access management (IAM) for the Department of Defense (DoD). Spoiler alert—it’s not just about keeping
Recent Posts
Achieve FedRAMP with Confidence
In today’s evolving digital landscape, ensuring that your software meets the highest standards of security is critical—especially when working within the federal sector. One of the most significant milestones for software companies looking to serve
Federation Bubbles with Justin Richer, CTO of UberEther
Welcome to Episode 1 of UberEther’s Cyber Defense In-depth Series! Join Justin Richer, CTO of UberEther, as he introduces Federation Bubbles—a groundbreaking approach to identity federation. In this episode, Justin explores how the bubble architecture
The CMMC Imperative: Why CMMC Compliance is Critical for Your Business
In recent discussions, we’ve highlighted the essential role Identity and Access Management (IAM) teams play in achieving cybersecurity and Cybersecurity Maturity Model Certification (CMMC) Level 2 compliance. However, before diving deeper into IAM strategies, it’s
IAM Teams: The Unsung Heroes of CMMC Level 2 Cybersecurity Compliance
In today’s digital age, cybersecurity is paramount for organizations striving to protect sensitive data and comply with stringent regulations. Amidst the complex web of cybersecurity measures, Identity and Access Management (IAM) teams stand as the
PIV-D Credentials Are Not Up to the Zero Trust Challenge
PIV-D credentials and zero trust security
PIV-D needs to die. But then what?
Identity access management is the first layer for any viable zero-trust strategy, as it should be. The NIST 800-63-4 Digital Identity Guidelines revision coming out in draft at the end of the year should accommodate