Cisco Blogs / Nicholas Leali
Nicholas Leali
Security Analyst, IntelliShield
Cisco Security Intelligence Operations
Nick Leali is a Security Analyst for the IntelliShield team, part of Cisco Security Intelligence Operations. IntelliShield produces vulnerability and threat alerts published through a variety of services. Nick collaborates closely with other groups including Cisco PSIRT, Cisco Applied Intelligence, and the Cisco IPS Signature team to coordinate document publications.
As part of his work for IntelliShield, Nick regularly contributes to the weekly Cyber Risk Report, IntelliShield alerts, Threat Outbreak Alerts, and other publications on the Security Intelligence Operations portal, including the Mid-Year and Annual Security Reports.
Nick is a graduate of the Ohio State University Fisher College of Business and holds a Bachelor of Science in Business Administration. Nick also holds technical certifications from Microsoft and Cisco.
When not working diligently for Cisco, Nick works diligently as a father, husband, and friend in central Ohio.
Articles
Practical Tips for Safekeeping your Mobile Devices
Now when I’m talking about safekeeping a mobile device, I’m not saying don’t use your Kindle by the pool or let your toddler play on the iPad while eating ice cream. These are dangerous things to be doing with a gadget, but today I want to focus more on the data within that device,…
Cisco Security Intelligence Operations NCSAM 2013
For the last couple of years, Cisco Security Intelligence Operations has released a series of blog posts for National Cybersecurity Awareness Month. The theme for this month from the National Cyber Security Alliance is “Our Shared Responsibility.” The Department of Homeland Security is r…
Summary of Microsoft Security Bulletin for August 2013
That’s right folks, today is Patch Tuesday and Microsoft has published its monthly security bulletin for August 2013. The bulletins address a total of 23 vulnerabilities in Microsoft Windows, Microsoft Internet Explorer, and Microsoft Exchange. These vulnerabilities could allow an attacker to execut…