RFC 8573: Why Trust in Time Matters for Your Network
Your network may use timestamps from a completely untrusted time source within an IP network. RFC 8573 shows how to overcome this.
The Future of Public Sector
Join us for our #FutureofPublicSector blog series to explore what the future may hold, how technology opens doors to possible, and how to enable countries and communities to thrive.
One Security Framework to Address Zero Trust, NIST, CARTA, CDM, and HVA
Well, the industry now understands where Cisco is going! A modern security framework/architecture should be designed to cover all the important security frameworks and compliance requirements. Cisco has been developing...
Smart water making a splash
Many water utilities are getting ready to embark on their own smart water expedition. They may wonder where to start. The key is to get started no matter how small and build the foundation to expand smart water use cases based on most critical needs.
Network automation: offering choices now key
Moving your IT organization to network automation and programmability now requires offering choices based on three key options.
Cybersecurity for Federal Networks: It All Starts with Visibility
Staying secure means ensuring deeper visibility into your network. But visibility must go beyond the mere identification of packet flows. User identity should also be linked to packet flows wherever possible. Find out what that means in our latest blog on Cybersecurity in government.
Cloud ready networks for government: Connecting everyone and everything
Cloud ready networks and intent-based networking are the new drivers for government IT Modernization. Find out how they can impact your cloud strategy.
Hosted Collaboration Solution for Defense (HCS-D) Launched
Cisco announces provisional authority to operate (PATO) for Hosted Collaboration Solution for Defense (HCS-D). Cisco HCS-D is a FedRAMP+ authorized, cloud hosted offering with provisional authorization to operate at Impact Level 5 (IL 5).
Zero Trust for Government Networks: 6 Steps You Need to Know
Zero Trust security is an architectural model for network security. Find out the 6 Steps to Zero Trust and its “never trust, always verify, enforce least privilege” approach.
Explore our Government Solutions
Use our new interactive tool to discover how you can solve your government, public sector, cities and communities, and transportation challenges and accelerate your business transformation.
Want to read more?
See the latest from the Cisco Government blogs platform.