Épisodes

  • Orbital Dominance – What Federal & DoD Leaders Need to Know Now
    Feb 19 2026

    In this episode we condense key insights from the Spacepower 2025 conference, emphasized in an eBook "Orbital Dominance: Acquisition, Strategy, and Threats in Space" by Breaking Defense. Stealth satellites, advanced moving target indication (AMTI) from space, satellite acquisition reform, and new training environments, highlight the importance of integrating multi-source data, enforcing Zero Trust security, and avoiding single-vendor dependencies. Key themes include low observability satellites, multi-vendor AMTI stacks, funding flexibility for acquisition portfolios, realistic orbital warfare training, and the implications of ongoing innovation program uncertainties. Federal and defense leaders need to prioritize space domain awareness, resilient sensing architectures, and modern training infrastructures to stay ahead in the rapidly evolving space arena.

    00:00 Overview of Spacepower 2025 Conference 02:02 Emerging Threats in Space 03:02 Airborne Moving Target Indication (AMTI) 04:40 Acquisition Portfolio Cleanup 06:01 Training the Force for Orbital Warfare 07:19 Innovation Challenges and Future Directions 08:21 Conclusion and Key Takeaways

    This episode is brought to you by ATP Gov. Visit us online at www.atpgov.com or follow us on LinkedIn.

    Afficher plus Afficher moins
    11 min
  • Microsegmentation: The Resilience Lever for Zero Trust in Federal and DoD Missions
    Feb 12 2026

    In this episode of the BLUF, we're focusing on zero trust architecture and microsegmentation. We delve into ColorTokens X-Shield, highlighting its capabilities in segmenting and protecting diverse IT, OT, and IoT environments. It emphasizes the product's features, such as agent-based and agentless microsegmentation, Kubernetes native architecture, and integration with EDR solutions like CrowdStrike. The episode also explains how X Shield can mitigate breaches, maintain network resilience, and support operational continuity in federal and DOD missions, aligning with MITRE Zero Trust and OTCC guidelines.

    00:00 Introduction 00:38 Understanding Zero Trust and Micro-Segmentation 01:29 Deep Dive into Color Tokens X Shield 04:47 Real-World Application Scenarios 07:37 Competitive Landscape and Differentiators 08:39 Conclusion and Call to Action

    This episode is brought to you by ATP Gov. Visit us online at www.atpgov.com or follow us on LinkedIn.

    Afficher plus Afficher moins
    10 min
  • The South Vector: How to Lock Down Vendor Maintenance Before It Locks You Out
    Feb 5 2026

    In this episode of The Bottom Line Up Front, insights from a webinar presented by Cam Cullen, CMO for BlastWave, are distilled. The discussion centers on constructing a defensible architecture with a focus on remote access for third-party OT vendors, addressing vulnerabilities such as the "South Attack Vector" and the increasing role of AI agents. Key points include the breakdown of traditional air gapping, the rise of CVEs in OT systems and security devices, and practical controls for improving security, such as replacing passwords with cryptographic keys and implementing micro-segmentation. Additional highlighted vulnerabilities are showcased through cases like the Oldsmar facility and the Target breach. The discussion extends to securing AI and cloud edges, aligning with federal and military zero trust principles, and concludes with a phased implementation strategy for a zero trust OT environment.

    00:00 Introduction 00:38 The Broken Air Gap and Remote Maintenance 01:33 Security Vulnerabilities and Exploits 02:31 Case Studies: Real-World Incidents 02:54 Practical Security Controls 03:55 Comprehensive Network Protection 04:04 Microsegmentation and Device-Level Security 04:51 Hardening Remote Access and Onsite Controls 05:21 AI, Cloud Edges, and Zero Trust Principles 05:50 Federal and Military Alignment 07:36 Implementation Playbook for Zero Trust OT Strategy 08:46 Conclusion and Call to Action

    This episode is brought to you by ATP Gov. Visit us online at www.atpgov.com or follow us on LinkedIn.

    Afficher plus Afficher moins
    10 min
  • Beyond the Firewall - Modernizing Secure Access with SonicWall Cloud Secure Edge
    Jan 29 2026

    This episode examines the shift to remote work and the inadequacy of traditional VPNs, drawing from a recent SonicWall webinar on secure access and Cloud Secure Edge (CSE). It covers SonicWall’s transition from outdated VPN models to zero trust frameworks. The focus is on the need for continuous validation, device posture assessment, and adaptive policy enforcement to ensure secure, mission-ready operations. SonicWall's CSE, integrating identity and device trust for dynamic, resource-specific access via VPN alternatives, promises ease of deployment for resource-strained federal IT teams. The episode stresses the urgency for agencies to adopt zero trust models to combat growing cybersecurity threats.

    00:00 The Shift to Remote Work and Its Challenges 00:55 SonicWall's Webinar on Secure Access 02:25 The Castle and Moat Problem with VPNs 04:29 Introducing SonicWall's Cloud Secure Edge 06:11 Zero Trust Model and Device Trust Verification 08:15 Ease of Deployment and Real-World Applications 11:39 Conclusion and Call to Action

    This episode is brought to you by ATP Gov. Visit us online at www.atpgov.com or follow us on LinkedIn.

    Afficher plus Afficher moins
    13 min
  • Securing Data Exchange in a Zero Trust World with Kiteworks
    Jan 22 2026

    This episode focuses on secure data exchange in a zero trust environment with a detailed look at Kiteworks, a platform designed to protect sensitive information, enforce compliance, and simplify collaboration. Kiteworks offers end-to-end encryption, zero trust access controls, and integrates with various enterprise tools. It supports large files, complex policies, and multiple data channels, making it suitable for DOD, civilian agencies, law enforcement, and healthcare. Listeners are encouraged to integrate Kiteworks for improved data security and compliance.

    00:00 Introduction 00:38 Today's Focus: Secure Data Exchange in a Zero Trust World 01:19 Overview of Kiteworks Platform 02:16 Technical Deep Dive into Kiteworks 03:11 Kiteworks Deployment and Integration 05:13 Use Cases and Success Stories 06:27 Conclusion and Call to Action

    This episode is brought to you by ATP Gov. Visit us online at www.atpgov.com or follow us on LinkedIn.

    Afficher plus Afficher moins
    8 min
  • Hardware Integrity at the BIOS: TOUGHBOOK Guard & Smart Compliance for Federal Missions
    Jan 15 2026

    This episode focuses on Panasonic's Toughbook Guard, which enhances hardware and firmware security, particularly against modern adversaries targeting these layers. The podcast discusses the importance of securing the supply chain, hardware integrity verification, and compliance with CJIS v6.0, FISMA, and NIST 800-53. Toughbook Guard validates hardware integrity before the OS loads, preventing unauthorized hardware changes. Accompanying tools like Eclypsium provide component-level inventory and tamper detection. Key takeaways include building an allow list for repairs, integrating with SOCs, and treating hardware integrity as a zero-trust requirement.

    00:00 Introduction 00:38 Understanding Modern Adversaries 01:31 Panasonic Toughbook Guard Overview 02:16 Smart Compliance with Eclypsium 03:08 Federal and Military Relevance 03:50 Field Realities and Sustainment 04:55 Key Takeaways and Action Items 06:11 Conclusion and Contact Information

    This episode is brought to you by ATP Gov. Visit us online at www.atpgov.com or follow us on LinkedIn.

    Afficher plus Afficher moins
    7 min
  • Quantum Resistance: Practical Steps for Federal Agencies and Defense Contractors
    Jan 8 2026

    This episode delves into practical measures agencies and contractors can adopt to prepare for the quantum computing threat. Key topics include cryptographic inventory, quantum-safe VPNs, enhanced randomness, and identity management. Joey Swartz from ATP Gov presented a white paper outlining five steps toward quantum resistance. Emphasis is placed on understanding and cataloging current cryptographic methods, integrating quantum-safe practices in DevSecOps, securing VPNs, and employing quantum random number generation. The episode underscores the importance of a risk-informed, phased approach to quantum readiness while highlighting ATP Gov's role as a vendor-neutral integrator for quantum defense.

    00:00 Introduction 00:38 The Quantum Threat Landscape 02:12 Practical Steps Towards Quantum Resistance 03:59 Integrating Quantum Safe Practices in DevSecOps 05:07 Securing VPNs with Post-Quantum Cryptography 06:48 Quantum Random Number Generators 08:27 Strengthening Identity and Machine Authentication 09:51 Conclusion and Call to Action

    This episode is brought to you by ATP Gov. Visit us online at www.atpgov.com or follow us on LinkedIn.

    Afficher plus Afficher moins
    12 min
  • Cisco Hypershield: A New Era in Segmentation and Exploit Protection
    Jan 1 2026

    In this episode of Bottom Line Up Front, we deliver key insights from Cisco's webinar on Hypershield, a next-generation security architecture. The discussion focuses on how Hypershield addresses segmentation and exploit protection in hybrid environments using AI, EBPF, and autonomous segmentation. The platform supports zero-trust and defense in depth, featuring dual enforcement for workloads and networks, AI-driven policy recommendations, and dual data plane architecture for safe simulations. Scheduled for general availability by August 2025, it aims to provide enhanced cybersecurity for federal and military IT operations.

    00:00 Introduction 00:37 Overview of Cisco's Hyper Shield 01:20 Technical Deep Dive into Hyper Shield 01:57 AI-Driven Policy Recommendations 03:27 Hyper Shield's Dual Data Plane Architecture 03:43 Relevance to Federal Cybersecurity 04:07 Future Roadmap and Vendor Collaboration 04:55 Conclusion and Call to Action

    This episode is brought to you by ATP Gov. Visit us online at www.atpgov.com or follow us on LinkedIn.

    Afficher plus Afficher moins
    7 min