Passwordless Authentication and the Identity Perimeter

A metallic key on a circuitboard.

Passwordless authentication is a potential lynchpin for organizations struggling with identity as their security perimeter. While neither FedRAMP nor CMMC explicitly mandates passwordless technologies, both frameworks set requirements and outcomes that passwordless authentication can meet.

For organizations operating in regulated environments, especially those handling government data or CUI, passwordless authentication is no longer an emerging trend. It is rapidly becoming the most defensible approach to meeting modern compliance expectations.

 

Read More

Salt Typhoon, Rootkits, and Compliance

green button with the word "Access" on it in a shattered glass case.

When U.S. officials began publicly discussing the threat actor known as Salt Typhoon, it was clear this was something beyond mere disorganized attacks. But for compliance leaders, the more important question was how a campaign of this scale could operate for so long within systems that were supposed to be compliant?

At the center of this gap is a concept many organizations believe they have already addressed… namely, rootkits.

 

Read More

CISA, Compliance and the Industry Engagement Platform (IEP) 

The CISA government bannerhead

CISA’s Industry Engagement Platform (IEP) signals a meaningful shift in how that relationship works. While the platform is not a compliance or procurement system it represents something arguably more useful: a formalized, structured mechanism for continuous engagement between CISA and the private sector.

For organizations operating in regulated environments, particularly those subject to FedRAMP, CMMC, StateRAMP, FISMA, and emerging cross-sector performance goals, the IEP is more than an informational portal. It is an early indicator of how government cybersecurity compliance will increasingly be shaped: collaboratively, iteratively, and with greater emphasis on real-world capability rather than static checklists.

 

Read More