Is Network Resilience the New Metric for Federal Cybersecurity?

Here at the AFCEA Homeland Security conference, we’re hearing a very different tone on cyber security than in years past.

Federal agencies are starting to think differently about cybersecurity and how to intelligently defend their networks.

Network Resilience: That Was Then

A former DHS cybersecurity chief mentions the need for “infrastructures that are defensible” thus moving away from proprietary and large complex networks towards a model defined by the use of field-tested solutions and the cost of maintaining these highly customized legacy networks is enormously expensive.

For years, Federal agencies focused on creating an impermeable exterior network defense, then, conventional wisdom came around to prevention.

Network Resilience: This Is Now

Today, officials are talking about network resilience as the cornerstone of the Federal cyber security posture. Phyllis Schnuck, a former head of DHS cyber security, said it best. “It’s not about prevention, it’s about resilience. When you are hacked, who’s going to come out on top?”

It’s unnerving that the Federal government would accept that large scale network breaches will happen. Yet here we are with the fact that the growing sophistication and sheer scale of cyber attacks are at a breaking point.

Network Resilience: The New Barometer

Federal IT administrators are using network resilience as the new barometer of effective cyber strategies. We all know that networks will wobble, be it from a natural disaster or malicious intent, but they collapse. If they do, they should be intelligently designed for a large scale and quick disaster recovery.

Network Resilience: Rapid Recovery

Quick disaster recovery allows infiltrated areas of a network to be quickly isolated, tracing malicious activity back to a single client in real time through visibility into your network, giving IT administrators the intelligent tools to mitigate problems quickly and effectively.

Resilience sounds like an unacceptable compromise at first. Isn’t protection of critical information the very basis of any cybersecurity mission? The reality is that there is no 100% solution in cybersecurity.

Threats are already inside our network, and more are bound to follow. The best we can do is pick our networks off the floor, dust them off, make intelligent platform changes, and send them back out there to fight another day.


An avatar of the author

BlueCat provides core services and solutions that help our customers and their teams deliver change-ready networks. With BlueCat, organizations can build reliable, secure, and agile mission-critical networks that can support transformation initiatives such as cloud adoption and automation. BlueCat’s growing portfolio includes services and solutions for automated and unified DDI management, network security, multicloud management, and network observability and health.

Related content

Micetro 11.1 boosts DHCP management for Cisco Meraki SD-WAN

Learn how BlueCat Micetro 11.1 can help you overcome the limitations of Cisco Meraki SD-WAN devices to manage your distributed DHCP architecture.

Read more
Banner announcing BlueCat's acquisition of LiveAction, displaying both logos and the phrase "We're about to get bigger."

BlueCat acquires LiveAction to drive network modernization and optimization

BlueCat’s acquisition of LiveAction will allow customers to expand their view beyond DNS and dive deeper into the health of their network.

Read more

Simplify NIS2 compliance with DNS management

Learn whether the EU’s NIS2 requirements apply to your organization and about how DNS management and BlueCat can boost your path to compliance.

Read more

Detect anomalies and CVE risks with Infrastructure Assurance 8.4 

The Infrastructure Assurance 8.4 release features an anomaly detection engine for outliers and a CVE analysis engine to uncover device vulnerabilities.

Read more

Unlock the secrets to modernizing your IT network! Join our webinar on January 23 to learn how self-service DNS and DHCP can help you solve the cloud puzzle.