Last week at Black Hat 2015 in Las Vegas, NV, DHS Deputy Secretary Alejandro Mayorkas gave a keynote address on closing the “trust deficit” between industry and government, highlighting the need to rebuild trust after a government security breach. This week, Fuel Board Member John Matelski, Chief Innovation & Information Officer of the Dekalb County, GA Government, responds with his thoughts on how best to repair a loss of trust after a breach like the one affecting the U.S. Office of Personnel Management (OPM).
Closing the "Trust Deficit:" A Response to Deputy Secretary Mayorkas's Black Hat Keynote
Posted by Fuel HQ on Aug 12, 2015 2:00:00 PM
Topics: Cybersecurity, Fuel Board of Directors, Government, Hot Topic
A Government Cybersecurity Pro Responds to the US Government Breach
Posted by Fuel HQ on Jun 8, 2015 1:00:00 PM
by John Matelski
Another day, and yet another cyber hack! As someone who works for a county government agency, I know all too well the daily challenges that are faced maintaining a secure infrastructure, and protecting citizen and constituent data. The unfortunate reality is, as our society becomes more digitally enabled and reliant, we are creating more avenues through which criminals can access our data.
Though the cases that make the news are the big ones like the IRS data breach, or the Sony hack – our reality is the attacks against small businesses, local governments and individuals are the ones that impact us the most. Many times, businesses that are successfully targeted by a cyber-attack go out of business soon thereafter. They simply do not have the resources to respond and recover.
Topics: Cybersecurity, Fuel Board of Directors, Big Data,, Government, Hot Topic
Hot Topics: NIST Cybersecurity Framework in the News and on the Forums
Posted by Fuel HQ on Mar 23, 2015 2:00:00 PM
by Fuel HQ
In February 2014 the National Institute of Standards and Technology (NIST) released a Framework for Improving Critical Infrastructure Cybersecurity to help security organizations better protect information and physical assets from cyber attacks. The framework provided a structure that organizations, regulators and customers can use to improve comprehensive cybersecurity programs. Even though the Framework was released last year, the conversations continue about whether it is effective or if it is dynamic enough to handle changes in the landscape.
Topics: Cybersecurity, Government, Hot Topic
Rank & File: Protecting Consumers From Cyber Attacks
Posted by Kate Taylor on Feb 23, 2015 12:20:00 PM
by Kate Taylor
It seems that folks interested in cybersecurity fall into two camps: those holding their breath for government to step in and protect the public from cybercriminals through regulation, and those crossing their fingers that the legislative branch will continue to create cybersecurity awareness but ultimately leave it to the professionals.
Topics: Cybersecurity, Threat, Government
Posts by Topic
- Friday Fuel Up (125)
- Cybersecurity (96)
- Palo Alto Networks (44)
- Fuel Education (39)
- Fuel News (28)
- Charles Buege (26)
- Network Security (22)
- Hot Topic (21)
- Spark User Summits (21)
- Member Benefits (20)
- Fuel Original Member Spotlight (16)
- Fuel Webcast (16)
- Fuel Board of Directors (14)
- Fuel Partners (14)
- Fuel Chapters (10)
- Unit 42 Podcast (10)
- cybersecurity question of the month (10)
- Cloud Security (9)
- Cloud Security Management (9)
- Ignite (9)
- Fuel (8)
- Fuel member stories (8)
- NGFW (8)
- Webinar (8)
- Maril Vernon (7)
- Threat (7)
- cybersecurity tools (7)
- strategies for security (7)
- threat prevention (7)
- Fuel Meetings (6)
- PAN-OS 8.0 (6)
- SSL decryption (6)
- best practices (6)
- cybersecurity careers (6)
- machine learning (6)
- training (6)
- Fuel Volunteers (5)
- Fuel member (5)
- Integration, (5)
- cybersecurity protocol (5)
- firewall (5)
- Best Practices Booklet (4)
- Government (4)
- IPSec Tunnel (4)
- Join Fuel (4)
- Myths (4)
- PCNSE (4)
- certification (4)
- Big Data, (3)
- Cloud (3)
- Data Breaches (3)
- Endpoint Security (3)
- Global Protect (3)
- Laura Penhallow (3)
- Palo Alto Networks Next-Generation Firewall (3)
- Project Rome (3)
- cloud management (3)
- culture (3)
- network management (3)
- next-generation firewall (3)
- public cloud (3)
- security tools (3)
- tips (3)
- ASA (2)
- Active Directory (2)
- Adaptive Security Appliance (2)
- Automation (2)
- COVID-19 (2)
- Career paths (2)
- Cloud Service (2)
- DevSecOps (2)
- Enterprise Firewalls (2)
- Fuel Online Forums (2)
- Fuel Virtual Test Lab (2)
- IaaS (2)
- Ignite 2018 (2)
- LIVEcommunity (2)
- MITRE (2)
- Migration (2)
- Nagios (2)
- Open Source (2)
- Open Source Software (2)
- PA-220 (2)
- PAN-OS 10 (2)
- PAN-OS 8.1 (2)
- PAN-OS 9.0 (2)
- PaaS (2)
- Panorama (2)
- Tip of the Week (2)
- VPN (2)
- Volunteerism (2)
- WildFire (2)
- application framework (2)
- artificial intelligence (2)
- career advice (2)
- cybersecurity skills gap (2)
- detection and analysis (2)
- incident response (2)
- incident response framework (2)
- infographic (2)
- myth (2)
- network administration (2)
- network connectivity (2)
- network visibility (2)
- next-generation security (2)
- professional development (2)
- remote employees (2)
- resources (2)
- security (2)
- the cloud (2)
- threat detection (2)
- threat intelligence (2)
- threat preparation (2)
- 10.0 PAN-OS (1)
- 2019 (1)
- 5 Year Anniversary (1)
- AJ Yawn (1)
- API (1)
- APIs (1)
- ASA to PAN Migration (1)
- AWS (1)
- Amazon S3 (1)
- Amazon Web Services (1)
- AutoFocus (1)
- Azure (1)
- Blogs (1)
- Books (1)
- Cisco Meraki MX64 (1)
- Cloud APIs (1)
- Cloud Threats (1)
- Cybersecurity Books (1)
- DNS Security (1)
- DevOps (1)
- Dwight Hobbs (1)
- Employment Shortage (1)
- FedRAMP (1)
- Fuel President (1)
- Fuel Webinar (1)
- Fuel for Thought (1)
- GDPR (1)
- General Data Protection Regulation (1)
- George Finney (1)
- Google Cloud Platform (1)
- Google Kubernetes Engine (1)
- Healthcare (1)
- IPFire (1)
- IPsec VPN (1)
- Ignite '20 (1)
- Industry 4.0 (1)
- InfoSec (1)
- Information Security (1)
- Infrastructure as a Service (1)
- Insider (1)
- Interface Management Profile (1)
- Internet of Things (IoT) (1)
- MITRE ATT&CK (1)
- MITRE Shield (1)
- Microsoft (1)
- Microsoft Azure (1)
- NAT Policy (1)
- NetOps (1)
- Network Time Protocol (1)
- Oneil Matlock (1)
- PA-220R (1)
- PAN-OS 7.1 (1)
- Palo Alto Networks 200 (1)
- Palo Alto Networks 3020 (1)
- Performance Testing (1)
- Platform as a Service (1)
- Point to Point VPNs (1)
- Policy Optimizer (1)
- Pradeep Biradar (1)
- Prisma Access (1)
- Prisma Cloud (1)
- RedLock (1)
- Roundtable discussion (1)
- SASE (1)
- SOC 2 (1)
- SSH Connection (1)
- SSL Forward Proxy (1)
- SSL Inbound Inspection (1)
- SaaS (1)
- Security Life Cycle Review (1)
- SolarStorm Attack (1)
- SolarWinds (1)
- Spark Chicago (1)
- Static Routing (1)
- TAC Support (1)
- Tanya Janca (1)
- Then and Now (1)
- Traffic (1)
- Tufin (1)
- URL Filtering (1)
- Unit 42 (1)
- VLAN (1)
- Well Aware (1)
- active directory integration (1)
- admin roles (1)
- audits (1)
- auto-tagging (1)
- backbox (1)
- book review (1)
- case study (1)
- cloud migration (1)
- cloud myths (1)
- complete context (1)
- computer (1)
- coronavirus (1)
- customer service (1)
- cybersecurity attacks (1)
- cybersecurity podcasts (1)
- cybersecurity threats (1)
- educational resources (1)
- elasticsearch (1)
- elasticsearch cluster (1)
- endpoint devices (1)
- firewall safety (1)
- firewall upkeep (1)
- fuel 5 year anniversary (1)
- garland (1)
- glossary (1)
- hacking (1)
- how-to articles (1)
- hybrid cloud (1)
- internet of things (1)
- iot (1)
- kids (1)
- lab upgrade (1)
- monitoring (1)
- network leak monitoring (1)
- online safety (1)
- pVLAN (1)
- parts of a computer (1)
- password manager (1)
- passwords (1)
- perimeter (1)
- podcasts (1)
- pricing (1)
- public sector (1)
- public sector IT jobs (1)
- secure access service edge (1)
- security culture (1)
- security framework (1)
- security solutions (1)
- security stacks (1)
- security tips (1)
- sed (1)
- shared responsibility (1)
- skills shortage (1)
- standardization (1)
- stress (1)
- threat landscape (1)
- tips for stress management (1)
- tracking (1)
- update (1)
- virtual lab (1)
- visibility gap (1)