Uncategorized

Zero Trust Strikes Back

Evolving Cybersecurity has become a critical priority for agencies in today’s rapidly changing digital landscape. The traditional “Trust but Verify” approach, rooted in Cold War diplomacy, is increasingly inadequate against sophisticated cyber threats. This model often leads to complacency, as initial trust is seldom re-evaluated, creating vulnerabilities that adversaries can exploit. Limitations of “Trust But […]

Zero Trust Strikes Back Read More »

Cross-Functional Collaboration for Compliance Success

Cross-Functional Collaboration for Compliance Success with ATO Advantage Successful compliance in regulated environments isn’t just about automation or adaptive learning. It’s about people working together across functions to ensure every part of the organization is aligned and committed to meeting regulatory standards. Cross-functional collaboration is what brings compliance to life in the development process. With

Cross-Functional Collaboration for Compliance Success Read More »

DoD Workload Identity Requirements for NPEs

Strengthening DoD Workload Requirements for NPEs: An Essential Overview Hey folks, let’s dive right into the world of identity and access management (IAM) for the Department of Defense (DoD). Spoiler alert—it’s not just about keeping tabs on humans anymore. We’ve entered an era where non-person entities (NPEs) and workloads hold critical roles in mission operations.

DoD Workload Identity Requirements for NPEs Read More »

Achieve FedRAMP with Confidence

In today’s evolving digital landscape, ensuring that your software meets the highest standards of security is critical—especially when working within the federal sector. One of the most significant milestones for software companies looking to serve federal clients is obtaining an Authorization to Operate (ATO). This credential demonstrates that your product complies with rigorous federal security

Achieve FedRAMP with Confidence Read More »

Federation Bubbles with Justin Richer, CTO of UberEther

Welcome to Episode 1 of UberEther’s Cyber Defense In-depth Series! Join Justin Richer, CTO of UberEther, as he introduces Federation Bubbles—a groundbreaking approach to identity federation. In this episode, Justin explores how the bubble architecture pattern brings flexibility and security to federated systems, providing granular control over identity and access management in ever-changing environments. Key

Federation Bubbles with Justin Richer, CTO of UberEther Read More »

IAM Teams: The Unsung Heroes of CMMC Level 2 Cybersecurity Compliance

In today’s digital age, cybersecurity is paramount for organizations striving to protect sensitive data and comply with stringent regulations. Amidst the complex web of cybersecurity measures, Identity and Access Management (IAM) teams stand as the unsung heroes, playing a critical role in achieving and maintaining CMMC Level 2 compliance. The Crucial Role of IAM Teams

IAM Teams: The Unsung Heroes of CMMC Level 2 Cybersecurity Compliance Read More »

Real World Web Service Security at Oracle Open World 2011

Last week Matt presented Real World Web Service Security at Open Open World.  Our team has been securing web services for over 10 years, long before anyone knew what REST was.  The presentation talks about the last 10 years of web service security and where we think the space is going next. Real World Web

Real World Web Service Security at Oracle Open World 2011 Read More »

Oracle’s Jump Into the Big Data Realm

Many of you may have seen that Oracle officially announced their new Big Data product offerings today. Included in that list is the Apache distribution of Hadoop, Oracle Loader for Hadoop, Oracle Data Integrator Adapter for Hadoop, the Oracle NoSQL Database, and Oracle’s R Enterprise. On the Oracle Big Data pages it seems like there

Oracle’s Jump Into the Big Data Realm Read More »