The Imperative of Customer-Controlled Encryption Keys and SaaS Tenant Log...
In the ever-evolving cybersecurity landscape, the recent Microsoft key compromise incident is a stark reminder of the importance of customer-controlled encryption keys and SaaS tenant log transparency....
View ArticleUberEther’s IAM Advantage Achieves FedRAMP High Authorization: Cost and Time...
STERLING, VA – OCT 26, 2023 – UberEther, a leading provider of identity and access management (IAM) solutions, announced today that its IAM Advantage solution has achieved FedRAMP High authorization....
View ArticleIdentity Management is More Important than CISOs Think
How important is identity management and authentication for securing Federal networks? It depends on who you ask. If you ask me, it’s critical. The fact is, the perimeter is no longer the enterprise...
View ArticlePIV-D needs to die. But then what?
Identity access management is the first layer for any viable zero-trust strategy, as it should be. The NIST 800-63-4 Digital Identity Guidelines revision coming out in draft at the end of the year...
View ArticlePIV-D Credentials Are Not Up to the Zero Trust Challenge
Matt Topper Let’s talk about why PIV-D credentials are not up to the zero trust challenge. Derived personal identity verification (PIV-D) credentials, a NIST-compliant method to protect government...
View ArticleIAM Teams: The Unsung Heroes of CMMC Level 2 Cybersecurity Compliance
Matt Topper /*! elementor - v3.23.0 - 23-07-2024 */ .elementor-widget-text-editor.elementor-drop-cap-view-stacked...
View ArticleThe CMMC Imperative: Why CMMC Compliance is Critical for Your Business
Matt Topper In recent discussions, we’ve highlighted the essential role Identity and Access Management (IAM) teams play in achieving cybersecurity and Cybersecurity Maturity Model Certification (CMMC)...
View ArticleFederation Bubbles with Justin Richer, CTO of UberEther
/*! elementor - v3.23.0 - 23-07-2024 */ .elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading...
View ArticleAchieve FedRAMP with Confidence
Matt Topper In today’s evolving digital landscape, ensuring that your software meets the highest standards of security is critical—especially when working within the federal sector. One of the most...
View ArticleDoD Workload Identity Requirements for NPEs
Matt Topper /*! elementor - v3.23.0 - 23-07-2024 */ .elementor-widget-image{text-align:center}.elementor-widget-image a{display:inline-block}.elementor-widget-image a...
View Article