government

October 17, 2019

GOVERNMENT

RFC 8573: Why Trust in Time Matters for Your Network

Your network may use timestamps from a completely untrusted time source within an IP network. RFC 8573 shows how to overcome this.

October 16, 2019

GOVERNMENT

The Future of Public Sector

Join us for our #FutureofPublicSector blog series to explore what the future may hold, how technology opens doors to possible, and how to enable countries and communities to thrive.

July 31, 2019

GOVERNMENT

Cloud ready networks for government: Connecting everyone and everything

Cloud ready networks and intent-based networking are the new drivers for government IT Modernization. Find out how they can impact your cloud strategy.

July 23, 2019

GOVERNMENT

Hosted Collaboration Solution for Defense (HCS-D) Launched

Cisco announces provisional authority to operate (PATO) for Hosted Collaboration Solution for Defense (HCS-D). Cisco HCS-D is a FedRAMP+ authorized, cloud hosted offering with provisional authorization to operate at Impact Level 5 (IL 5).

July 11, 2019

THREAT RESEARCH

Should governments pay extortion payments after a ransomware attack?

When it comes to ransomware attacks this year, it’s been a tale of three cities. In May, the city of Baltimore suffered a massive ransomware attack that took many of its...

July 1, 2019

GOVERNMENT

Zero Trust for Government Networks: 6 Steps You Need to Know

Zero Trust security is an architectural model for network security. Find out the 6 Steps to Zero Trust and its “never trust, always verify, enforce least privilege” approach.

May 24, 2019

GOVERNMENT

At Cisco, your Battle Buddy has your 6

What's a battle buddy? In the US Military, a battle buddy protects your back. And your Cisco battle buddy can do the same thing. Find out how.

April 30, 2019

GOVERNMENT

Mission success: HCS-D will achieve a DoD first

HCS-D is more than a product, it's a passion, empowering Cisco's top tech for the DoD, with Impact Level 5 assessment in process. Find out how it will deliver a first to those defending our nation.

April 24, 2019

GOVERNMENT

Securing Government: It all starts at the DNS Layer

One common thread between cyber-attacks is external communication. Malicious communication typically starts, or is exploited, at the DNS layer. Find out how to defend it.