Articles
#WednesdayWalkabout Series: Stay Protected While Always Connected
Co-authored with Dani Schrakamp Cybersecurity for all October is #CyberAware month. This year marks the 12th anniversary of this national cybersecurity awareness campaign, with it bringing a hot topic of discussion. In the digital age, increasing amounts of data are being shared in new and often una…
Security Is a Top Priority for Feds and Should Be Moving Forward
It’s no secret that security is top priority for the federal government. It seems like every week we are hearing about a new threat, hack, or breach that has hit an agency. In just the past few weeks, we’ve heard about significant breaches that have resulted in both citizen and federal employee info…
Driving Conversations on Cybersecurity in the Public Sector
Just like private businesses, public sector organizations are taking advantage of today’s “boundless” infrastructures. They also face the same challenging reality when implementing those networks: a threat to data security. For public sector, the stakes are especially high. The proliferation of hack…
#HigherEdThursdays – Cybersecurity for Higher Education: Is your network protected?
Cybersecurity is a hot topic and a major concern for all organizations. No one is immune, and indeed, higher education institutions can fall victim to large breaches as well. In fact, according to PrivacyRights.org, below are a few examples from the last 6 months: Date Name Records Lost 22-…
Check out the Cisco Security Blog
My posts will be focused on bringing topics of interest to government and business decision makers and explaining topics that could be very technical at level to allow good business decisions. As a company, Cisco is blessed with some very smart and technical people who can go into much greater dept…
Cybersecurity Awareness Month: Unsampled Netflow – Why it’s Important for Cybersecurity
Quick question for IT leaders – can the switches on your network report 100% unsampled netflow? If they can’t, there may be elusive cybersecurity threats hiding within your network. Yes, inside your network. Every week, I hear stories of intellectual property (IP) loss and personal identifyin…