{"id":1993,"date":"2023-03-13T09:46:19","date_gmt":"2023-03-13T09:46:19","guid":{"rendered":"https:\/\/www.new.try2ascend.com\/wp\/?page_id=1993"},"modified":"2023-08-10T20:05:52","modified_gmt":"2023-08-10T20:05:52","slug":"us-government","status":"publish","type":"page","link":"https:\/\/try2ascend.com\/cyberware\/us-government\/","title":{"rendered":"U.S. Government"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"1993\" class=\"elementor elementor-1993\">\n\t\t\t\t\t\t<div class=\"elementor-section elementor-top-section elementor-element elementor-element-02c9407 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"02c9407\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b98be6f\" data-id=\"b98be6f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-591ce9c elementor-widget elementor-widget-security-area\" data-id=\"591ce9c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"security-area.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\r\n                    <div class=\"cybersecurity-area pt-100 pb-100\">\r\n                <div class=\"container\">\r\n                    <div class=\"row\">\r\n                                                    <div class=\"col-lg-6\">\r\n                                <div class=\"cybersecurity-content text-left\">\r\n                                    <h2>Service First \u2014 U.S. Military Registered Vendor<\/h2>\r\n\r\n                                    <p>The United States Government is a frequent target for cybercriminals, with federal agencies reporting\u00a0<a href=\"https:\/\/www.hsgac.senate.gov\/imo\/media\/doc\/2019-06-25%20PSI%20Staff%20Report%20-%20Federal%20Cybersecurity%20Updated.pdf\">35,277 cyber incidents<\/a> in 2017 alone. In the face of increasing threats to our critical infrastructure and essential services by malicious foreign actors, cybersecurity standards are getting tighter across the entire government sector. And it\u2019s not just the agencies themselves. Contractors are now being required by the U.S. Department of Defense to align with their security standards. Failure to comply is not only unwise, but it can also cost businesses defense contracts.<\/p><p>Cyberware Al\u2019s SecOps experts are the highest-tiered in the government procurement system (Level IIl),3, and have years of battle-proven experience safeguarding U.S. Government assets around the world. Armed with the latest in artificial intelligence and machine learning tools, our experts monitor, detect, report, and close our partners\u2019 security gaps, bring contractors and government agencies into compliance, and protect the interests of the U.S. government and the American way of life.<\/p><p>The USFCR Verified Vendor seal (left) links to Cyberware AI\u2019s official U.S. Govt vendor mini-site. USFCR maintains an active government vendor registration database that is complete and error-free.\u00a0 (left)<\/p>\r\n                                    <div class=\"row\">\r\n                                                                                <div class=\"col-lg-6 col-sm-6\">\r\n                                            <ul class=\"cybersecurity-item\">\r\n                                                                                                        <li>\r\n                                                            <i class=\"fa fa-check\"><\/i>\r\n                                                                                                                    <\/li>\r\n                                                                                                    <\/ul>\r\n                                        <\/div>\r\n\r\n                                        <div class=\"col-lg-6 col-sm-6\">\r\n                                            <ul>\r\n                                                                                            <\/ul>\r\n                                        <\/div>\r\n                                    <\/div>\r\n                                <\/div>\r\n                            <\/div>\r\n                                                    <div class=\"col-lg-6 pr-0\">\r\n                                <div class=\"cybersecurity-img\" style=\"background-image: url(https:\/\/cyberware.ai\/wp-content\/uploads\/2023\/03\/usfr-seal-verified-vendor-no-bg-1.png )\"><\/div>\r\n                            <\/div>\r\n                                            <\/div>\r\n                <\/div>\r\n                            <\/div>\r\n                \t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-faf4473 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"faf4473\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-72da74c\" data-id=\"72da74c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-0f739bd elementor-section-full_width elementor-section-stretched elementor-section-height-default elementor-section-height-default\" data-id=\"0f739bd\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8dea66f\" data-id=\"8dea66f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e310879 elementor-widget elementor-widget-image\" data-id=\"e310879\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"770\" height=\"1993\" src=\"https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2023\/08\/Cyberware-Government.jpg\" class=\"attachment-full size-full wp-image-2262\" alt=\"\" srcset=\"https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2023\/08\/Cyberware-Government.jpg 770w, https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2023\/08\/Cyberware-Government-116x300.jpg 116w, https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2023\/08\/Cyberware-Government-396x1024.jpg 396w, https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2023\/08\/Cyberware-Government-768x1988.jpg 768w, https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2023\/08\/Cyberware-Government-593x1536.jpg 593w, https:\/\/try2ascend.com\/cyberware\/wp-content\/uploads\/2023\/08\/Cyberware-Government-530x1372.jpg 530w\" sizes=\"(max-width: 770px) 100vw, 770px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Service First \u2014 U.S. Military Registered Vendor The United States Government is a frequent target for cybercriminals, with federal agencies reporting\u00a035,277 cyber incidents in 2017 alone. In the face of increasing threats to our critical infrastructure and essential services by malicious foreign actors, cybersecurity standards are getting tighter across the entire government sector. And it\u2019s <\/p>\n","protected":false},"author":1,"featured_media":2073,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1993","page","type-page","status-publish","has-post-thumbnail","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/pages\/1993","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/comments?post=1993"}],"version-history":[{"count":0,"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/pages\/1993\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/media\/2073"}],"wp:attachment":[{"href":"https:\/\/try2ascend.com\/cyberware\/wp-json\/wp\/v2\/media?parent=1993"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}