Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Ultimate Guide to Kubernetes and FedRAMP Compliance

Kubernetes is an extremely powerful tool for scaling, automating, and managing applications and systems. There’s a reason it has become industry standard, with over 80% of container-using enterprises running K8s, encompassing over 60% of enterprises in general. It makes sense that, sooner or later, Kubernetes users will need to contend with the FedRAMP framework and the security requirements necessary to maintain operations. Fortunately, this is generally a good thing.

Navigating the U.S. Public Sector's Unrelenting Cyber Crisis

The U.S. public sector faces unique challenges as it is tasked with safeguarding the most sensitive data of citizens, all while maintaining the critical infrastructure that keeps society functioning. Unfortunately, government and educational institutions are no longer just peripheral targets, they are on the frontline of cyberattacks.

Inside A Government Agency With No Threat Model

A central government department relied on a part time virtual security lead, ageing tools and no central view of security data, with nobody owning real decisions. When asked what type of attacker would target their systems or whether they had a threat led defence, nobody from engineering to leadership had an answer, despite direct access to national guidance.

What Happens If You Lose Your FedRAMP Authorization?

We’ve talked a lot about the process a business goes through to achieve FedRAMP authorization and the ability to work with a government department or agency. What about the other side of the coin? What happens if you lose that authorization? Depending on how and why, the consequences can range from minimal to dire, so it’s important to know and be prepared.

Keeper Security Achieves FedRAMP High Authorization for Privileged Access Management

As federal agencies face increasingly sophisticated cyber threats, securing high-impact systems and sensitive unclassified data has become a top priority. To support this need, Keeper Security has achieved FedRAMP Authorization at the High Impact Level for its Keeper Security Government Cloud (KSGC) platform, expanding its ability to protect the U.S. federal government’s most sensitive unclassified workloads.

AI Risk Governance Suite - office hours part 1

Kovrr’s new AI Risk Governance Suite gives enterprises the visibility, structure, and measurable control needed to manage GenAI responsibly across its full lifecycle. Join us for Office Hours: Part 1, where Or Amir will walk through the first three modules of the suite—showing how enterprises can gain real-time oversight and quantifiable insight into their AI landscape: Discover how these capabilities help enterprises align innovation with accountability—building a defensible foundation for responsible GenAI adoption.

How Seal Security Helps You Meet FedRAMP Vulnerability Detection and Response Standard

Earlier this year, FedRAMP RFC-0012 signaled a coming shift in how cloud service providers (CSPs) working with the U.S. federal government are expected to handle vulnerabilities. It outlined plans to move FedRAMP away from simple CVSS-score thresholds and toward continuous, context-aware, exploitability-driven, and automation-first vulnerability management.

What New Changes Are Coming to FedRAMP in 2026?

One thing is certain: every year, the cybersecurity threat environment will evolve. AI tools, advances in computing, the growth of high-powered data centers that can be weaponized, compromised IoT networks, and all of the traditional vectors grow and change. As such, the tools and frameworks we use to resist these attacks will also need to change. While in some years, the evolution of protection is slow and steady, some promise larger shakeups.

How Contractor Privileged Access Failures Exposed Data Across 45 Federal Agencies

Earlier this year, twin brothers Muneeb and Sohaib Akhter, both government contractors, were fired from their employer. Minutes later, they began a weeklong insider attack that compromised or destroyed data belonging to more than 45 federal agencies.

Head of Public Policy Mike Centrella talks CISA Shutdown Updates - Nov. 13, 2025

News alert: With the government shutdown coming to an end, the continuing resolution includes the extension of CISA 2015 (Cybersecurity Information Sharing Act). However, sustained information sharing isn't optional, it's crucial for national resilience and security. A reinstitution of CISA 2015 for the coming weeks is just the beginning. "Timely, trusted threat intelligence sharing is foundational to both national security and private sector resilience.".