Stars-image

Blog

Welcome to Silent Sector's blog, news, and resource area.
0 Comments

Episode # 90 - Supercomputing with Ken Wiley

This week, the guys welcome IT leader Ken Wiley, who shares about cutting-edge work in the field of supercomputing, insights gained from a highly successful IT and cybersecurity career, plus some current tech trends to watch closely. 

For more on Ken and Silverdraft, please see the links below. 

https://www.linkedin.com/in/wileyken/

https://silverdraft.com/

Read More
0 Comments

The US Government Wants You(r) Cloud Application!

Have a great cloud application that is successful in the private marketplace and considering selling to the federal government? There is a proven path to do this that could propel your company to financial success and reputational notoriety by getting a Federal cloud authorization! Government sales of cloud applications and cloud services can be very lucrative - but first, let’s answer some basic questions about this process to understand it more.

Read More
0 Comments

What is the Purpose of Penetration Testing and Why is Penetration Testing Important?

"Do we need penetration testing?"

Read More
0 Comments

CMMC 2.0 - What Changed?

The Cybersecurity Maturity Model Certification (CMMC) is a third-party assessment program created by the DoD to gauge the maturity of an organization's cybersecurity practices and verify the protection of Federal Contract Information (FCI) as well as Controlled Unclassified Information (CUI). When CMMC 1.0 was released in 2017, there were concerns amongst government contractors as it was incredibly pricey for small organizations, contained vague language of CMMC assessment process, and did not include a lot of overlap in cybersecurity requirements to other federal requirements or commonly accepted standards.

Read More
0 Comments

Secure Data Life Cycle - Securing Your Most Important Asset from "Cradle to Grave"

Understanding your company's data life cycle is a critical aspect of your cyber risk management program. A recent article in Forbes Magazine quotes figures from Domo, a business intelligence company, who reports that 2.5 quintillion bytes of data are created every day, and that 90% of all data currently on the Internet was created in the past 2 years.

Read More
0 Comments

Cybersecurity for Education SaaS - EdTech

Educational Technology or “EdTech” is a discipline of Technology focused solely on the development of Software as a Service (SaaS) to improve student learning. Despite EdTech sounding field-specific, its impact is far-reaching as education or even the lack of it touches everyone’s life. This blog will dissect how cybersecurity intersects with EdTech.

Read More
0 Comments

Security Requirements Dilemma

Read More
0 Comments

Cybersecurity Grows Revenue

Read More
0 Comments

SAAS Security Issues

The use cases for Software as a Service (SaaS) are undeniably vast and advantageous. However, the nature of subscribing to a cloud service leaves a ton of ambiguity as to who is responsible for its security… The vendor or the customer? This article will present a 10,000-foot view of SaaS and the unintentional risks that surface when organizations bring in cloud services like SaaS. 

Read More