Avatar

Norman St. Laurent

Federal Product Marketing Manager

Security

Mr. St. Laurent has 32 years of Intelligence Community Cyber Security and Computer Network Forensics Experience.

Articles

February 1, 2024

SECURITY

Interview: Former FBI Analyst on the CJIS MFA Mandate & Duo

6 min read

Hear how law enforcement agencies can more easily meet the new MFA mandates from the FBI CJIS Security Policy using Cisco Duo in this interview.

December 13, 2023

SECURITY

Cisco XDR: SLEDs “SOC in a Box”

5 min read

Learn how Cisco XDR simplifies and enhances the operations of SLED-focused SOCs, helping them achieve their security resilience goals.

September 11, 2023

GOVERNMENT

Enhancing Firepower at the National Security Agency

4 min read

Did you know the NSA has just released the Cisco Firepower Threat Defense (FTD) Hardening Guide? Learn how it can help your agency strengthen its cyber defense.

July 17, 2023

GOVERNMENT

Data Loss Prevention and the Value of Artificial Intelligence

6 min read

The integration of AI into our everyday world requires digital communications to become more secure, enabling data loss prevention. We offer a step-by-step example of how to do it, all in our latest blog.

February 20, 2023

GOVERNMENT

Cisco is Transitioning from FIPS 140-2 to FIPS 140-3

5 min read

Encryption is key to protecting Federal data. That's why Cisco is transitioning from FIPS 140-2 to FIPS 140-3. Get the why and how in our latest blog.

December 12, 2022

GOVERNMENT

Cybersecurity Grants: Your Playbook to Success

4 min read

Just as in college football, a playbook is essential for state and local governments as they tackle growing cyber threats. Get started today.

November 30, 2022

GOVERNMENT

A Peek into the Newly Released DoD Zero Trust Strategy (Part 1 of 2)

5 min read

Get up to speed on the newly released DoD Zero Trust Strategy, including their 7 Pillars of Zero Trust, in part 1 of our 2 part blog series.

November 14, 2022

GOVERNMENT

Achieving Authorization to Operate With Less Complexity Utilizing the Cisco Security Architecture

3 min read

With Cisco products, the data you need is already embedded in your network and is ready to be leveraged. Achieve ATO with confidence and best of breed security. Find out how.