Solutions Blog

Solutions Blog Insights From Experts Who Get IT

  • Topics
    • Cloud (246)
    • Data Center (284)
    • Digital Workspace (372)
    • Networking (220)
    • Security (240)
    • Software (247)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

Ed Gawlik


Ed Gawlik is a technical lead for CDW’s InfoSec consulting service, working with organizations in many industries to grow and mature their InfoSec programs.

InfoSec Consulting Service Technical Lead


Attacks on SCADA Systems Highlight the Need for Effective Cybersecurity

Security frameworks can help energy and utility companies find the solutions and services that best meet their needs.

By Ed Gawlik
|
February 4, 2019
Security, Networking, Services

In December 2015, more than 200,000 Ukrainians found themselves without power during a blackout cause by a cyberattack launched from within the Russian Federation. The attack was carried out by a spear-phishing campaign that was used to install malware on energy company computers. The malware, dubbed BlackEnergy, was specifically designed for use against industrial control…

Read More   

Digital Transformation Security Takes More Than Just Great Technology

IT departments can head off shadow IoT projects by proactively building relationships with business units.

By Ed Gawlik
|
July 31, 2018
Security, Networking, Services

If you don’t talk to your business units about the Internet of Things, who will? IT history shows why that’s not a glib question. Over the past decade, many enterprises suffered embarrassing security breaches and hefty noncompliance fines because their business units signed up for a cloud service without IT’s blessing or even knowledge. Why?…

Read More   

SCADA Security: Infrastructure in the Crosshairs

In addition to standard cybersecurity tools, specialized controls can improve the defenses of industrial networks.

By Ed Gawlik
|
May 3, 2018
Security, Networking

Last year, nearly 40 percent of industrial control systems worldwide experienced attacks from external sources, according to a Kaspaersky analysis. That’s a sobering statistic, especially when coupled with evidence that cyberattacks were involved in crippling power outages in the Ukraine in late 2015. The following year, closer to home, U.S. cybersecurity officials accused Iran of…

Read More   

Why It Makes Sense to Move to a Holistic, Risk-Based Security Strategy

Identifying, evaluating and prioritizing risks across an organization allows IT teams to secure operating environments while supporting business functions.

By Ed Gawlik
|
December 5, 2017
Security, Services

Over the years, I’ve seen a remarkable shift in the way organizations approach their cybersecurity strategies. After the Health Insurance Portability and Accountability Act (HIPAA) and the Payment Card Industry Data Security Standard (PCI DSS) debuted, most security programs focused on compliance issues. Organizations scrambled to ensure their operations were up to par before the…

Read More   
Recommended for You

Most Popular
Digital Workspace | Security

Mobile Security Is at the Heart of Modern Device Design

Networking | Security

Fight Social Engineering and Phishing Attacks by Correcting Risky Behaviors and Rewarding User Diligence

Data Center | Security

How to Handle GDPR Data Subject Access Requests

Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2019 CDW. All Rights Reserved