NIST Archives - | ̽Ƶ Wed, 22 Apr 2026 14:40:42 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.8 Beyond “Checklist” Compliance: Resilience in Healthcare Cybersecurity /wordpress/cyturus-beyond-checklist-compliance-resilience-in-healthcare-cybersecurity-blog-2026/ /wordpress/cyturus-beyond-checklist-compliance-resilience-in-healthcare-cybersecurity-blog-2026/#respond Wed, 22 Apr 2026 14:40:42 +0000 /wordpress/?p=12029 For healthcare and medical institutions, dealing with sensitive information comes with the territory of patient care. In 1996, The Health Insurance Portability and Accountability Act (HIPAA) set several regulations for protecting patient privacy; however, it has few guidelines with how … Continue reading

The post Beyond “Checklist” Compliance: Resilience in Healthcare Cybersecurity appeared first on | ̽Ƶ.

]]>
/wordpress/cyturus-beyond-checklist-compliance-resilience-in-healthcare-cybersecurity-blog-2026/feed/ 0
Why Supply Chain Risk Management is Now a Public Sector Resilience Priority /wordpress/onspring-supply-chain-risk-management-is-a-public-sector-resilience-priority-blog-2026/ /wordpress/onspring-supply-chain-risk-management-is-a-public-sector-resilience-priority-blog-2026/#respond Tue, 31 Mar 2026 18:00:08 +0000 /wordpress/?p=11924 From ransomware disrupting city services to vendor failures impacting school operations, supply chain failures seem to be dominating the headlines lately. Naturally, whether your organization is in the Private or Public Sector, you’ll want to avoid attracting attention for the … Continue reading

The post Why Supply Chain Risk Management is Now a Public Sector Resilience Priority appeared first on | ̽Ƶ.

]]>
/wordpress/onspring-supply-chain-risk-management-is-a-public-sector-resilience-priority-blog-2026/feed/ 0
Removing Complexity from Compliance: Buoyant and TestifySec /wordpress/buoyant-testifysec-removing-complexity-from-compliance-blog-2026/ /wordpress/buoyant-testifysec-removing-complexity-from-compliance-blog-2026/#respond Wed, 04 Feb 2026 21:23:16 +0000 /wordpress/?p=11704 Traditionally, achieving an Authorization to Operate (ATO) has been a grueling marathon. It often demands expensive consulting fees, lengthy manual documentation and no clear visibility into where your architecture actually stands against NIST 800-53 requirements. For organizations running cloud-native architectures … Continue reading

The post Removing Complexity from Compliance: Buoyant and TestifySec appeared first on | ̽Ƶ.

]]>
/wordpress/buoyant-testifysec-removing-complexity-from-compliance-blog-2026/feed/ 0
The Process-Oriented View: CISO Visibility During an OT Attack /wordpress/siga-ciso-visibility-during-an-ot-attack-blog-2025/ /wordpress/siga-ciso-visibility-during-an-ot-attack-blog-2025/#respond Thu, 13 Nov 2025 20:39:26 +0000 /wordpress/?p=11515 When a cyber incident occurs in an operational technology (OT) environment, understanding what is actually happening can become difficult. Control systems may continue to display normal readings even if attackers have begun manipulating logic or feedback within Programmable Logic Controllers … Continue reading

The post The Process-Oriented View: CISO Visibility During an OT Attack appeared first on | ̽Ƶ.

]]>
/wordpress/siga-ciso-visibility-during-an-ot-attack-blog-2025/feed/ 0
Preparing Federal Systems for Post-Quantum Security: A Strategic Approach /wordpress/thales-preparing-federal-systems-for-post-quantum-security-a-strategic-approach-blog-2025/ /wordpress/thales-preparing-federal-systems-for-post-quantum-security-a-strategic-approach-blog-2025/#respond Mon, 09 Jun 2025 17:51:58 +0000 /wordpress/?p=10918 Federal agencies face an urgent timeline to protect their most sensitive data from quantum computing threats. Quantum computers leverage physics principles like superposition and entanglement to perform calculations faster than classical computers, posing a significant threat to current encryption standards. … Continue reading

The post Preparing Federal Systems for Post-Quantum Security: A Strategic Approach appeared first on | ̽Ƶ.

]]>
/wordpress/thales-preparing-federal-systems-for-post-quantum-security-a-strategic-approach-blog-2025/feed/ 0
From Concept to Implementation: Operationalizing Zero Trust Architecture in Government Environments /wordpress/palo-alto-networks-from-concept-to-implementation-operationalizing-zero-trust-architecture-in-government-environments-blog-2025/ /wordpress/palo-alto-networks-from-concept-to-implementation-operationalizing-zero-trust-architecture-in-government-environments-blog-2025/#respond Tue, 27 May 2025 18:29:04 +0000 /wordpress/?p=10798 Zero Trust has evolved over the last 15 years into a cornerstone of Federal cybersecurity strategy, influencing enterprises as well as State and Local Governments. While the principles of continuous authentication and least privilege are widely accepted, many organizations still … Continue reading

The post From Concept to Implementation: Operationalizing Zero Trust Architecture in Government Environments appeared first on | ̽Ƶ.

]]>
/wordpress/palo-alto-networks-from-concept-to-implementation-operationalizing-zero-trust-architecture-in-government-environments-blog-2025/feed/ 0
Modern Fraud Threats in Government Relief Programs: How Agencies Can Defend Against Cybercrime /wordpress/human-security-modern-fraud-threats-in-government-relief-programs-how-agencies-can-defend-against-cybercrime-blog-2025/ /wordpress/human-security-modern-fraud-threats-in-government-relief-programs-how-agencies-can-defend-against-cybercrime-blog-2025/#respond Tue, 20 May 2025 13:28:06 +0000 /wordpress/?p=10679 A recent investigation by CBS News’ “60 Minutes” has highlighted a significant issue: organized crime rings, often operating from overseas, are using stolen identities to steal billions of dollars from the U.S. Federal and State programs. These sophisticated fraud schemes … Continue reading

The post Modern Fraud Threats in Government Relief Programs: How Agencies Can Defend Against Cybercrime appeared first on | ̽Ƶ.

]]>
/wordpress/human-security-modern-fraud-threats-in-government-relief-programs-how-agencies-can-defend-against-cybercrime-blog-2025/feed/ 0
Bridging Identity Governance and Dynamic Access: The Anatomy of a Contextual and Dynamic Access Policy /wordpress/sailpoint-bridging-identity-governance-dynamic-access-policy-blog-2025/ /wordpress/sailpoint-bridging-identity-governance-dynamic-access-policy-blog-2025/#respond Thu, 06 Feb 2025 22:15:16 +0000 /wordpress/?p=10123 As organizations adapt to increasingly complex IT ecosystems, traditional static access policies fail to meet modern security demands. This blog instance continues to explore how identity attributes, and governance controls impact contextual and dynamic access policies—as highlighted previous articles; Governing … Continue reading

The post Bridging Identity Governance and Dynamic Access: The Anatomy of a Contextual and Dynamic Access Policy appeared first on | ̽Ƶ.

]]>
/wordpress/sailpoint-bridging-identity-governance-dynamic-access-policy-blog-2025/feed/ 0
Governing Identity Attributes in a Contextual and Dynamic Access Control Environment /wordpress/sailpoint-governing-identity-attributes-contextual-dynamic-access-control-environment-blog-2025/ /wordpress/sailpoint-governing-identity-attributes-contextual-dynamic-access-control-environment-blog-2025/#respond Thu, 16 Jan 2025 21:13:22 +0000 /wordpress/?p=10075 In the rapidly evolving landscape of cybersecurity, federal agencies, the Department of Defense (DoD), and critical infrastructure sectors face unique challenges in governing identity attributes within dynamic and contextual access control environments. The Department of Defense Instruction 8520.04, Identity Authentication … Continue reading

The post Governing Identity Attributes in a Contextual and Dynamic Access Control Environment appeared first on | ̽Ƶ.

]]>
/wordpress/sailpoint-governing-identity-attributes-contextual-dynamic-access-control-environment-blog-2025/feed/ 0
Vice President for StateRAMP Solutions, ̽Ƶ: StateRAMP: Recognizing the Importance of Framework Harmonization /wordpress/carahsoft-stateramp-the-importance-of-framework-harmonization-blog-2025/ /wordpress/carahsoft-stateramp-the-importance-of-framework-harmonization-blog-2025/#respond Thu, 16 Jan 2025 16:22:00 +0000 /wordpress/?p=10001 StateRAMP builds on the National Institute of Standards and Technology (NIST) Special Publication 800-53 standard, which underpins FedRAMP’s approach to cloud security for Federal agencies by offering a consistent framework for security assessment, authorization and continuous monitoring. Recognizing the need … Continue reading

The post Vice President for StateRAMP Solutions, ̽Ƶ: StateRAMP: Recognizing the Importance of Framework Harmonization appeared first on | ̽Ƶ.

]]>
/wordpress/carahsoft-stateramp-the-importance-of-framework-harmonization-blog-2025/feed/ 0