Isolate & contain: Challenges in cybersecurity

Best listening experience is on Chrome, Firefox or Safari. Subscribe to Fed Tech Talk’s audio interviews on Apple Podcasts or PodcastOne.

Blue Ridge Networks has been working with federal agencies for over twenty years. Today, we sit down with CEO John Higginbotham to talk about today’s challenges in cybersecurity.

Head shot of John Higginbotham
John Higginbotham, CEO, Blue Ridge Networks

If there is a theme of the interview, it is the phrase “isolate and contain.” Higginbotham talks about today’s porous networks. Malicious actors are inside networks and can move laterally. One approach that has been successful for Blue Ridge Networks locks down the intruder. He calls this anonymous security.


The method that is used comes right from NIST recommendations — segmenting networks. This segmenting approach comes under the general umbrella of “Zero Trust” architecture.

Higginbotham suggests that a federal system should be mapped, typically with more nodes than is expected. From here, access can be assigned for normal activities and then assigned for anomalies.  For example, if a federal employee logs in from Montana, and they are sitting across the hall from you, this would be an anomalous activity.

Copyright © 2019 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.