Avatar

Cybersecurity for Federal Government

Threats against our Federal government are growing. And so is the complexity of our nation’s networks, which are tasked with mandates and challenges unique to their specialized missions. As both outsider and insider threats evolve, it is critical that network technologies also evolve to provide a more intuitive and automated defense.

At Cisco, we are committed to partnering with the Federal government at every level to enhance the security of these networks, and our nation, by providing education, thought leadership, and promotion of best practices in cybersecurity.

Articles

March 4, 2020

GOVERNMENT

Zero Trust – Making a Deliberate Cybersecurity Lifestyle Choice

5 min read

Adopting Zero Trust as your agency's operational paradigm enables a new way of life for your network. Take a deeper dive to find out how.

February 20, 2020

GOVERNMENT

AMP for FedRAMP: Relentless Breach Defense

4 min read

Cyberthreats against government IT are growing - but now agencies can fight back with FedRAMP Ready Cisco® Advanced Malware Protection (AMP) for Endpoints.

December 20, 2019

GOVERNMENT

Using Automation with your Security Products

2 min read

Automation is changing the way we interact with network devices. But you might be hesitant to make the move. If so, here are three reasons why you need to embrace network automation now before it's too late.

October 2, 2019

GOVERNMENT

One Security Framework to Address Zero Trust, NIST, CARTA, CDM, and HVA

2 min read

Well, the industry now understands where Cisco is going! A modern security framework/architecture should be designed to cover all the important security frameworks and compliance requirements. Cisco has been developing...

August 13, 2019

GOVERNMENT

Cybersecurity for Federal Networks: It All Starts with Visibility

5 min read

Staying secure means ensuring deeper visibility into your network. But visibility must go beyond the mere identification of packet flows. User identity should also be linked to packet flows wherever possible. Find out what that means in our latest blog on Cybersecurity in government.

July 1, 2019

GOVERNMENT

Zero Trust for Government Networks: 6 Steps You Need to Know

2 min read

Zero Trust security is an architectural model for network security. Find out the 6 Steps to Zero Trust and its “never trust, always verify, enforce least privilege” approach.

April 24, 2019

GOVERNMENT

Securing Government: It all starts at the DNS Layer

2 min read

One common thread between cyber-attacks is external communication. Malicious communication typically starts, or is exploited, at the DNS layer. Find out how to defend it.