RFC 8573: Why Trust in Time Matters for Your Network
Your network may use timestamps from a completely untrusted time source within an IP network. RFC 8573 shows how to overcome this.
The Future of Public Sector
Join us for our #FutureofPublicSector blog series to explore what the future may hold, how technology opens doors to possible, and how to enable countries and communities to thrive.
Cloud ready networks for government: Connecting everyone and everything
Cloud ready networks and intent-based networking are the new drivers for government IT Modernization. Find out how they can impact your cloud strategy.
Hosted Collaboration Solution for Defense (HCS-D) Launched
Cisco announces provisional authority to operate (PATO) for Hosted Collaboration Solution for Defense (HCS-D). Cisco HCS-D is a FedRAMP+ authorized, cloud hosted offering with provisional authorization to operate at Impact Level 5 (IL 5).
Should governments pay extortion payments after a ransomware attack?
When it comes to ransomware attacks this year, it’s been a tale of three cities. In May, the city of Baltimore suffered a massive ransomware attack that took many of its...
Zero Trust for Government Networks: 6 Steps You Need to Know
Zero Trust security is an architectural model for network security. Find out the 6 Steps to Zero Trust and its “never trust, always verify, enforce least privilege” approach.
At Cisco, your Battle Buddy has your 6
What's a battle buddy? In the US Military, a battle buddy protects your back. And your Cisco battle buddy can do the same thing. Find out how.
Mission success: HCS-D will achieve a DoD first
HCS-D is more than a product, it's a passion, empowering Cisco's top tech for the DoD, with Impact Level 5 assessment in process. Find out how it will deliver a first to those defending our nation.
Securing Government: It all starts at the DNS Layer
One common thread between cyber-attacks is external communication. Malicious communication typically starts, or is exploited, at the DNS layer. Find out how to defend it.