MSI Announces Strategic Acquisition of Ascolta
MSI Announces Strategic Acquisition of Ascolta, Bolstering Advanced AI and Software Development Capabilities for Government and Industry
Introduction to Natural Language Processing (NLP)
Modern day Natural Language Processing, or NLP for short, is the computer manipulation and processing of any natural language that is used as a primary form of communication by humans.
Don’t ignore NIST 800-171 while waiting on CMMC
The DFARS 252.204-7012 rule has been around since 2016 and the Government fully expects contractors to already be in compliance with the 110 security controls established in NIST SP 800-171. As the Defense Industrial Base awaits the results of the rulemaking process and the adoption of DFARS rule 252.204-7021 that will require third-party CMMC certification, we all should have implemented the 110 controls by now. The only new requirement CMMC adds is the third-party assessment and certification requirement.
CMMC Scoping
Knowing what CUI you have, where it’s located and how it flows through your network will allow you to focus limited resources on hardening those assets. Attempting to harden and certify your entire network strains already overtaxed resources and exposes you to the additional, unnecessary challenges, of protecting them to NIST SP 800-171 standards. Only harden and certify those assets that process, store, and transmit CUI. By doing so you reduce your costs and your attack surfaces.
Writing Solid Implementation Procedures
How do you go about writing solid implementation procedures? The first step is to understand what the control objective requirements are and then to ensure you answer all the requirements with enough information to allow a stranger to pick up the procedures and recreate your original environment.
Documenting NIST 800-171 and CMMC
When it’s all said and done, you’re looking at a minimum of over 240 pages of documentation. That’s only a few weeks’ worth of writing, coordinating, and staffing. I hope you’re not starting from scratch!
OCR, Language Translator, and NLP
An Ascolta Senior Developer’s experience with OCR including performance timing of spaCy.
Improving your Zero-Trust Security with Cloudflare Access and HashiCorp Boundary
In this article, we will show how you can take a standard VPN-protected private network and implement these two tools to amplify your zero-trust practices. We’ll start by handling external threats with Cloudflare Access, where we will remove our VPN edge device; eliminating standard internet ingress to our network while still allowing authorized users in. Next, we’ll protect our internal network resources by using Hashicorp’s Boundary to restrict network visibility, better contain threats, and add strict identify-based access to individual resources.
Apache HTTP Server Reverse Proxy Configuration
The difference between the types of proxies is subtle. Forward proxies manages multiple clients, and reverse proxies manage multiple servers.