Articles
A Commander’s Intent-driven Network – Enabling Cyberspace Operations from the Tactical Edge and Beyond
2 min read
Join us for AFCEA TechNet Augusta 2024 as we explore how people, processes, and technology shape the Cyber Domain. Be sure to visit our Solutions Review Session and Booth #105 as we propel Army Cyberspace Operations into the future.
Accelerating Your Journey to the 128-bit Universe
3 min read
A lot has been happening this year, and with additional enablement from Cisco’s Country Digital Acceleration Program, Cisco has been busy providing enhanced capabilities and services designed to assist Government customers to develop plans and policies and implement capabilities and architectures on their journey to the 128-bit universe. Learn how.
Zero Trust for Government Networks: 4 Steps You Need to Know
4 min read
Zero Trust is not a product, it's a mindset. Find out the 4 Steps to an operational approach — and don't forget step 0!
Delving Deeper into the DoD Zero Trust Strategy – Part 2
4 min read
Join us as we continue our deep dive into Zero Trust strategy and the Department of Defense in part 2 of our series. Read now.
DreamPort ICS/OT Lab to Advance U.S. Cybersecurity Capabilities
2 min read
The state-of-the-art DreamPort lab – with cutting edge technology from Cisco and CyKor – will be another important asset in plugging the cyber gap and advancing our nation’s cybersecurity capabilities and strengths.
Transforming Cyber Operations with Network Infrastructure as Code (IaC)
3 min read
The network is fundamental to connect users, devices, applications, data, and services no matter where they reside—from edge to cloud; however, much of network administration has not changed meaningfully in 30 years. Why Model-Driven DevOps (MDD) for NetOps? I recently had the opportunity to speak at the Military Cyber Professionals Association’s first national conference – […]
The Bridge to Secure Modern Port Operations
4 min read
In today’s digitally-enabled ports and terminals, yesterday’s old security perimeter is insufficient. Adopting a zero trust security strategy is necessary to successfully modernize port operations.
Investing in Secure Maritime Operations: Cisco at “Hack the Port 22”
2 min read
The resounding message is clear: port and terminal operators, who are undertaking much-needed digital modernization efforts, must simultaneously implement improved cybersecurity capabilities that are designed and “built-in” to the industrial network infrastructure from the start. By connecting more equipment, devices, people, applications and embracing greater digitization, global port operators are realizing improved results – including […]
CMMC: A Strategic Imperative to Greater Value
4 min read
Recently, Cisco commissioned Forrester Consulting to study the projected return on investment that may be realized by engaging Cisco on their preparation efforts toward future accreditation by a third-party assessor to the CMMC requirements.
- 1
- 2