Secure Perspectives
How to Enter the Cybersecurity Job Field
Ever considered joining the cybersecurity job field? Read this article for a helpful place to start.
DevSecOps Perspectives
Unsure of where to start on how to implement DevSecOps in your software development processes? Use this blog as a baseline.
Don’t Forget These Critical Cyber Fundamentals
Although it is tempting to “not sweat the small stuff”, these cyber fundamentals are crucial when providing security to your network.
Why You Should Care About Authentication
Authentication is your first line of defense against cyber threats. Read more about methods of authentication and their importance.
Teaching Your Loved Ones to #BeCyberSmart
How often do you get recruited to assist a loved one with a computer or mobile device? This blog includes helpful tips to educate your loved ones during Cybersecurity Awareness Month.
Innovation Spotlight: Cyber Operations Center (CyOC)
Before the Cyber Operations Center (CyOC) was created, reporting was done via manual and labor-intensive processes requiring hundreds of man-hours, impacting the Agency’s ability for timely reporting leaving the agency with the inability to identify a single point of contact to view agency compliance as a whole.
Innovation Spotlight: MTRAP
Defense Health Agency (DHA) is currently migrating Military Treatment Facilities (MTF) into a DoD JIE CSRA compliant Medical Community of Interest (Med-COI) architecture. As a precursor to accessing the new Electronic Health Record (EHR), each MTF requires an evaluation of Information Technology assets and services. MTFs must undergo an in-depth Risk Management Framework (RMF) evaluation to receive an Authorization to Operate (ATO) on the Med-COI.
Innovation Spotlight: The EIDS Cyber Team
The Defense Health Agency’s (DHA) Enterprise Intelligence Data Solutions (EIDS) Program Management Office (PMO) MHS Information Platform’s (MIP) enclave mission objective is to seamlessly deliver the right information to the right person at the right time to Military Health System (MHS) stakeholders and partners in a safe, effective, efficient, timely, and cost-effective manner using Amazon Web Services (AWS).
Continuous Monitoring in the Cloud
The Health IT community has embraced an accelerated progression to cloud-based services and capabilities. With this progression comes a necessary question: ”What do we do next” when addressing critical cyber activities like Continuous Monitoring (CM) and persistent Risk Management (RM) “as a Service”?