government
RFC 8573: Why Trust in Time Matters for Your Network
6 min read
Your network may use timestamps from a completely untrusted time source within an IP network. RFC 8573 shows how to overcome this.
The Future of Public Sector
1 min read
Join us for our #FutureofPublicSector blog series to explore what the future may hold, how technology opens doors to possible, and how to enable countries and communities to thrive.
Zero Trust for Government Networks: 6 Steps You Need to Know
2 min read
Zero Trust security is an architectural model for network security. Find out the 6 Steps to Zero Trust and its “never trust, always verify, enforce least privilege” approach.
Securing Government: It all starts at the DNS Layer
2 min read
One common thread between cyber-attacks is external communication. Malicious communication typically starts, or is exploited, at the DNS layer. Find out how to defend it.
The Military’s Journey to Better Holiday Communications for Soldiers
3 min read
Nowadays, service members can communicate from almost anywhere, making the holidays brighter for military families. We salute our service members and remember the technology that makes their joy possible.
Litter: The Real Fabric of our Lives?
3 min read
Kenn D. shares why he loves working in Cisco's Public Sector Marketing and how they gave back recently in picking up roadside litter.
CDM: the new driver of cybersecurity and IT modernization
3 min read
Recently, I had the opportunity to join many of my industry, agency, and Capitol Hill colleagues at the U.S. Capitol to discuss the Department of Homeland Security’s ongoing Continuous Diagnostics...
The big myth about security patch management
3 min read
There's a big myth out there about patching. Is it an easy fix? The truth is, effective security patch management for your network can be difficult. Is your network secure?
Edge and fog computing: Key to safer streets? (Part 3)
3 min read
In parts one and two, we used Michael Crichton’s 1973 sci-fi movie, Westworld, to illustrate the concepts of edge and fog computing and how they may be the...