Cisco Blogs


Cisco Blog > Government

Will ‘good enough’ be enough? Take 2

I recently read an article about a “good enough” network. I know this has come up in the past, but this time was in a much different context. Some people might believe that a “good enough” network is enough enough when you are moving data and web servers, but what about when it becomes the lifeline for the power grid? Read More »

Tags: , , , , , , ,

Technology in the federal government

I recently had the opportunity to visit with Bill Bransford. Bill is with Shaw Bransford & Roth P.C., a law firm in the DC area, and is also the host of FED TALK, a radio show that is taped live every other Friday at 11:00 a.m. I was one of the two guests on this past week, along with Tim Simon, to discuss technology in the federal government. Topics included Cloud Computing, Cybersecurity, Mobility and Telework, and the ever famous Bring Your Own Device to work discussion. Read More »

Tags: , , , , , , , ,

What do Cloud, Cybersecurity and Telework all have in common?

As Telework policy initiatives expand globally the number of events, articles and forums has grown exponentially. Intersections are everywhere… and sometimes where you least expect them. As an example, Australia’s National Broadband Network (NBN) initiative, industry and goverment Cloud events – “Telework” is a common thread.

How should government agencies be investing in the cloud for their “Mobile Workforce?” How do policies need to change to address cybersecurity threats? What technologies best align with both government mandates? All of these were explored in detail. But, there’s a critical element that was strangely missing from many of the dialogues.

Technology and policy alone do not guarantee a successful “Telework” program. We the people – you and me – do! We are the final and third component of any successful Telework program – where the mix and balance of policy, technology, and people create the desired outcome – workforce efficiency. But how do you identify and hire the right people? How do you track workforce performance? How do you hire for success? According to a recent research study, “Top 5 personality traits of successful web workers,” there are personality traits to help guide your selection and retention of the workforce. 

Personally speaking I was not surprised to learn that extroverts make for great web-workers (teleworkers) – being one myself ;0).  What about you?

Tags: , , ,

Back to School

As summer rolls into fall, my kids are heading back to school.  It’s always an interesting transition but this year even more so with my daughter going away to college for the first time.   This has brought back a flood of memories from my own college education experiences. 

I have always had a passion for education and have a strong belief in continous learning. 

Today, so much is available on the web, through social media websites, and online video

In the world of technology and government, there is so much more to learn every day.  New technologies: cloud,  cybersecurity and virtualization, new delivery methods: virtual classrooms, online video, and collaboration, and new government requirements and certifications.

I recently came  across some useful learning resources including the Cisco CCNP Security Certification courseware and VMware/Cisco  network considerations for desktop virtualization.    

See below.   

Read More »

Tags: , , , , , ,

Breaches and the Backdoor Man – Stepping Stone Attacks

Most large organizations and enterprises at least try to take security pretty seriously. This means that the front door is not only usually locked, it is fortified and reinforced. This makes it hard for the bad guys to get in. So, do they give up? Of course not! What they do instead is look around back and start rattling the door knobs on the shed and cellar and the servants entrance and try to work their way in that way.

High value targets are usually locked down and secured pretty well, but this is not always the case for lower value targets. Once compromised, these lower value targets can provide a useful platform from which to attack other systems. For example, while traffic from the internet to internal hosts may be tightly limited, in many cases traffic between machines in the DMZ may not be as well regulated. Thus if you can own one machine in the DMZ, it can be easier to compromise other systems.

Read More »

Tags: , , ,