Natalie is a former program manager with the CCIE certification team at Cisco, managing exam curriculums and content for the CCIE Security track before becoming an independent consultant. She has been involved with computer networking for more than 20 years, much of which was spent with Cisco as a Technical Leader and has contributed at the IETF standards level and is a US Patent holder. Natalie is a guest blogger on for Network Computing and other social media sites and is also a Cisco Press author. Natalie has a CCIE Security Certification and is a multiple Cisco Live Distinguished Speaker award winner.



author:

Security

Maintaining a Secure Environment: Compliance Considerations

September 11, 2019

A security policy based on actual use cases has been documented, as have the components of the ecosystem. Before devising a practical implementation and configuration plan, one more assessment should be done involving the application of best practices and compliance mandates. Best practices are …



author:

Security

Maintaining a Secure Environment: Use Cases Build a Security Policy

August 12, 2019

Security is a key operational consideration for organizations today because a breach can lead to significant losses of revenue, reputation, and legal standing. An entity’s environment is an ecosystem comprised of users, roles, networking equipment, systems, and applications coming together to facilitate productivity and profitability …


author:

Security

Security Monitoring – It’s All About the Data

September 11, 2018

In this series, we’ve covered some key areas that can help prepare for potential attacks. Preparation is essential. Security policies are essential. Understanding your network and its assets is essential. What happens if a threat is detected? What can we do to monitor for …


author:

Security

Protection Methods – The Art of Data Analytics

August 28, 2018

The previous blog reviewed some guidelines that laid the foundation for security through understanding your environment and planning how elements within that environment are configured, used, accessed, and tracked. Although implementing these recommended best practices won’t make you impervious to all attacks, the concept …




author:

Security

Cybersecurity Fundamentals – Threat and Attack Terminology

July 18, 2018

In the first post of this blog series, we’ll cover the fundamentals of cybersecurity, and understanding basic terminology so you can feel comfortable “talking the talk.” Over the next few weeks, we’ll build on this introductory knowledge, and review more complex terms and methodologies …


1

2