The NIST Special Publication 1800-35 offers practical guidance for improving the security of manufacturing organizations through identity and access management (IAM). It outlines a collaborative approach using commercially available technologies…
Learn MoreA recent roundtable discussion, hosted by ATARC and PaloAlto Networks, brought together experts to address the evolving challenges of cybersecurity within government agencies and the DOD. Discussion highlighted crucial issues…
Learn MoreImmersive technologies like virtual, augmented, and mixed reality are rapidly transforming how we interact with digital environments—but they bring unique cybersecurity and privacy challenges. A recent NIST workshop explored how…
Learn MoreNIST Special Publication (SP) 800-162 outlines Attribute-Based Access Control (ABAC) as a key data security implementation approach. ABAC enables organizations (including federal government/military) to enforce security policies dynamically based on…
Learn MoreLaw enforcement agencies collect ten rolled and ten flat fingerprint impressions from all arrested individuals. However, some agencies are now allowing background check applicants or other non-arrest purposes to submit…
Learn MoreExplore key takeaways from the ATARC + Chainguard roundtable in “The Future of Open Source Security: A Trust-First Approach to the Federal Supply Chain.” This whitepaper offers strategic insights for…
Learn MoreLearn how Empower AI supported the DoD with mission-critical support at the customer service center. Through expertly deployed technology and automation, the department was able to better manage its 75,000…
Learn MoreThe AI Services Framework gives federal government agencies a pathway to adopt and expand artificial intelligence capabilities with confidence. Using pre-built accelerators, real-world use cases and a sound data strategy,…
Learn MoreAmerica’s latest executive order puts coal back at center stage, declaring it vital to the nation’s economic prosperity, grid reliability, and even the power-hungry growth of AI data centers. It…
Learn MoreExecutive Order 14262 aims to reinforce the reliability and security of the U.S. electric grid in response to rising demand from AI growth and domestic manufacturing. The Department of Energy…
Learn MoreThe fastest way to move RMF away from compliance and into the mission space is to stop treating authorization as a milestone and start treating it as a continuous engineering…
Learn MoreAs enterprise data ecosystems grow in complexity, traditional centralized data architectures often fall short. This whitepaper explores how Data Mesh, a decentralized socio-technical approach, offers a transformative solution for managing…
Learn MoreCyber threats targeting operational technology (OT) systems continue to pose a serious risk to U.S. critical infrastructure. In response, CISA, the FBI, EPA, and DOE have outlined key mitigations, including…
Learn MoreNIST SP 800-53 Revision 5 details a framework to protect organizations, the federal government/military, and their assets from a range of threats, including cyberattacks, insider threats, application security, supply chain…
Learn MoreThis study from the Bureau of Economic Analysis explores the potential of using credit and debit card transaction data to improve real-time consumer spending estimates. By integrating multiple commercial datasets,…
Learn More