Articles
Zero Trust – Making a Deliberate Cybersecurity Lifestyle Choice
These days there are so many initiatives for cybersecurity and digital transformation across Federal Government that it’s getting hard to keep up, let alone figure out how to implement them all. But by adopting Zero Trust as your agency’s operational paradigm, you can chart a principled…
AMP for FedRAMP: Relentless Breach Defense
Cyberthreats targeting Federal government IT are becoming increasingly evasive and complex. That’s why Federal agencies are rethinking their legacy antivirus solutions. And the best place to start? FedRAMP. Because a FedRAMP Authorized solution means strong, risk-based security that meets stringent…
Using Automation with your Security Products
Guest Author: Chris Johnson, Cybersecurity Technical Solutions Architect, DoD – Cisco Systems For network engineers, automation is changing the way we interact with the network devices that are a key part of our responsibilities. This is a fundamental change in the way that we’re used to contr…
One Security Framework to Address Zero Trust, NIST, CARTA, CDM, and HVA
Well, the industry now understands where Cisco is going! A modern security framework/architecture should be designed to cover all the important security frameworks and compliance requirements. Cisco has been developing a comprehensive end to end, cross-domain network architectural approach over the…
Cybersecurity for Federal Networks: It All Starts with Visibility
Guest Author: Neil Lovering | CCIE #1772 | Sr. Solutions Architect, Security @Cisco True story: A security director walks into a Security Operations Center (SOC) where a demonstration of a network visibility tool is occurring, in real-time, on his network. He immediately points out what h…
Zero Trust for Government Networks: 6 Steps You Need to Know
Government agencies are well along on their journey of Digital Transformation to fundamentally change the way they manage and deliver services throughout our country and to citizens. They are doing this by thinking differently about how they use their networks and taking advantage of new technologie…
Securing Government: It all starts at the DNS Layer
There’s no doubt that today’s business technology landscape is vastly different than five or ten years ago. That’s especially true for the Federal Government in the United States. With initiatives like digital transformation, cloud-first strategies, and defending forward in cyberspace, the attack su…