Secure Perspectives

National Cybersecurity Awareness Month

DevSecOps Perspectives

Unsure of where to start on how to implement DevSecOps in your software development processes? Use this blog as a baseline.

Read More »
National Cybersecurity Awareness Month

Teaching Your Loved Ones to #BeCyberSmart

How often do you get recruited to assist a loved one with a computer or mobile device? This blog includes helpful tips to educate your loved ones during Cybersecurity Awareness Month.

Read More »
Secure Perspectives

Innovation Spotlight: Cyber Operations Center (CyOC)

Before the Cyber Operations Center (CyOC) was created, reporting was done via manual and labor-intensive processes requiring hundreds of man-hours, impacting the Agency’s ability for timely reporting leaving the agency with the inability to identify a single point of contact to view agency compliance as a whole.

Read More »
Secure Perspectives

Innovation Spotlight: MTRAP

Defense Health Agency (DHA) is currently migrating Military Treatment Facilities (MTF) into a DoD JIE CSRA compliant Medical Community of Interest (Med-COI) architecture. As a precursor to accessing the new Electronic Health Record (EHR), each MTF requires an evaluation of Information Technology assets and services. MTFs must undergo an in-depth Risk Management Framework (RMF) evaluation to receive an Authorization to Operate (ATO) on the Med-COI.

Read More »
Secure Perspectives

Innovation Spotlight: The EIDS Cyber Team

The Defense Health Agency’s (DHA) Enterprise Intelligence Data Solutions (EIDS) Program Management Office (PMO) MHS Information Platform’s (MIP) enclave mission objective is to seamlessly deliver the right information to the right person at the right time to Military Health System (MHS) stakeholders and partners in a safe, effective, efficient, timely, and cost-effective manner using Amazon Web Services (AWS).

Read More »
Secure Perspectives

Continuous Monitoring in the Cloud

The Health IT community has embraced an accelerated progression to cloud-based services and capabilities. With this progression comes a necessary question: ”What do we do next” when addressing critical cyber activities like Continuous Monitoring (CM) and persistent Risk Management (RM) “as a Service”?

Read More »