President Biden’s Executive Order (EO) on Improving the Nation’s Cybersecurity puts security front and center to address some of the worst cyberattacks against the federal government. To accelerate technology modernization, Section 3 of the EO calls for agencies to expedite the adoption of cybersecurity best practices such as Zero Trust and secure cloud services. It specifically mandates the deployment […]
Author Archive for: Merlin Cyber
About Merlin Cyber
Merlin is the premier cybersecurity platform with a one-of-a-kind business model that leverages security technologies, trusted relationships, and capital to develop and deliver groundbreaking security solutions that help organizations minimize security risk and simplify IT operations. We do this by combining best-in-class cybersecurity solutions with groundbreaking emerging technologies that, together, deliver unprecedented visibility, control, and protection.
Entries by Merlin Cyber
Resource Center Helps Federal Agencies Navigate Key Requirements, Deadlines and Solutions TYSONS CORNER, Va. – Merlin Cyber, a premier cybersecurity solutions provider, today announced the availability of an Executive Order (EO) Resource Center developed to help U.S. Federal agencies better understand and meet the requirements of the Cybersecurity EO on Improving the Nation’s Cybersecurity. Key […]
Constellation GovCloud™ reduces time, complexity, and cost for software-as-a-service companies seeking to achieve FedRAMP Authority to Operate (ATO) TYSONS CORNER, Va. – Merlin Cyber, a premier cybersecurity solution provider, today launched Constellation GovCloud™, a managed service that is designed to accelerate Federal Risk and Authorization Management Program (FedRAMP) authorization for software-as-a-service (SaaS) companies. The managed […]
Join our LIVE Webinar Tuesday, December 15th 1pm EST So much cybersecurity time and attention is focused on software, while critical vulnerabilities are being exploited through hardware. It’s easy to fall victim to these rogue device attacks because hardware is viewed as inherently trusted. Recently these vulnerabilities are coming to light and beginning to be […]