Avatar

Nicholas Leali

Security Analyst, IntelliShield

Cisco Security Intelligence Operations

Nick Leali is a Security Analyst for the IntelliShield team, part of Cisco Security Intelligence Operations. IntelliShield produces vulnerability and threat alerts published through a variety of services. Nick collaborates closely with other groups including Cisco PSIRT, Cisco Applied Intelligence, and the Cisco IPS Signature team to coordinate document publications.

As part of his work for IntelliShield, Nick regularly contributes to the weekly Cyber Risk Report, IntelliShield alerts, Threat Outbreak Alerts, and other publications on the Security Intelligence Operations portal, including the Mid-Year and Annual Security Reports.

Nick is a graduate of the Ohio State University Fisher College of Business and holds a Bachelor of Science in Business Administration. Nick also holds technical certifications from Microsoft and Cisco.

When not working diligently for Cisco, Nick works diligently as a father, husband, and friend in central Ohio.

Articles

October 17, 2013

SECURITY

Practical Tips for Safekeeping your Mobile Devices

Now when I’m talking about safekeeping a mobile device, I’m not saying don’t use your Kindle by the pool or let your toddler play on the iPad while eating ice cream. These are dangerous things to be doing with a gadget, but today I want to focus more on the data within that device,…

October 1, 2013

SECURITY

Cisco Security Intelligence Operations NCSAM 2013

For the last couple of years, Cisco Security Intelligence Operations has released a series of blog posts for National Cybersecurity Awareness Month. The theme for this month from the National Cyber Security Alliance is “Our Shared Responsibility.” The Department of Homeland Security is r…

August 13, 2013

SECURITY

Summary of Microsoft Security Bulletin for August 2013

That’s right folks, today is Patch Tuesday and Microsoft has published its monthly security bulletin for August 2013. The bulletins address a total of 23 vulnerabilities in Microsoft Windows, Microsoft Internet Explorer, and Microsoft Exchange. These vulnerabilities could allow an attacker to execut…