Solutions Blog

Solutions Blog Insights From Experts Who Get IT

  • Topics
    • Cloud (246)
    • Data Center (284)
    • Digital Workspace (372)
    • Networking (220)
    • Security (240)
    • Software (247)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

Gabriel Whalen


Gabriel Whalen is a principal field solution architect within CDW’s information security practice. Previously, Gabriel worked in the national intelligence and security community as a counterintelligence subject matter expert, addressing traditional and emerging threat landscapes. He also worked in the private sector, providing enterprise security assessments to customers in a variety of industries, including healthcare, energy, manufacturing and consulting services. Gabriel is one of several recipients of the National Counterintelligence and Security Center’s Supply Chain Protection Award, as well as a graduate of CERT’s Insider Threat Program Manager course. He is also a Certified Information System Security Professional (CISSP). Gabriel obtained his master’s degree in forensic psychology from Argosy University in 2010 and lives with his family near Washington, D.C.

Principal Field Solution Architect


4 Easy Ways to Protect Yourself Against Email Phishing Attacks

Email threats such as spear-phishing trick users, but simple measures can improve your defenses.

By Gabriel Whalen
|
September 13, 2019
Security

It’s no secret that email is one of the most common ways that attackers gain a foothold on an organization’s network. Targeted spear-phishing campaigns use carefully designed messages that combine a sophisticated look and feel with appealing content to trick users into clicking on malicious messages. Awareness campaigns have their place, but the practical reality…

Read More   

Fight Social Engineering and Phishing Attacks by Correcting Risky Behaviors and Rewarding User Diligence

The carrot and stick approach makes sense when you understand why email-based attacks are successful.

By Gabriel Whalen
|
August 27, 2019
Security, Networking

I recently spent time speaking with IT leaders at CDW’s Protect SummIT in Philadelphia and heard a common theme: Organizations across the U.S. are incredibly concerned about the threat posed by social engineering attacks. All too often, leaders I speak with tell me that their organizations had recently fallen victim to phishing attacks that requested…

Read More   

Take Security Assessments to the Next Level

These four CDW services can deliver great value for organizations looking to take the next step in defense.

By Gabriel Whalen
|
May 29, 2019
Services, Security

My work takes me around the country and provides me with the opportunity to visit a wide variety of CDW customers across industries. As I’ve traveled over the past year, IT and cybersecurity leaders throughout the US sometimes tell me, “We’ve already handled the cybersecurity basics and conduct regular vulnerability scans and penetration tests. How…

Read More   

Find the Right Security Assessment to Meet Your Needs

Services vary in technical depth, scope and cost to fit the requirements of different organizations.

By Gabriel Whalen
|
January 7, 2019
Security, Services

A few months ago, I received a call from a CDW customer in the Midwest. The customer was in a rush and got right to the point of the call: "We need a penetration test." When I asked for more details about the type of testing required, the reply was simple: "We just need a…

Read More   

Don’t Underestimate the Value of the Cybersecurity Workforce

Skilled professionals and a solid security framework can help organizations establish an effective defense.

By Gabriel Whalen
|
September 10, 2018
Security

The IT workforce is a critical element of cybersecurity. New solutions come into the market to help organizations protect their data, but without skilled, experienced workers to implement them, these tools alone aren’t going to get the job done. During the CDW Managing Risk Summit in Boston last month, the importance of the cybersecurity workforce…

Read More   
Recommended for You

Most Popular
Digital Workspace | Security

Mobile Security Is at the Heart of Modern Device Design

Networking | Security

Fight Social Engineering and Phishing Attacks by Correcting Risky Behaviors and Rewarding User Diligence

Data Center | Security

How to Handle GDPR Data Subject Access Requests

Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2019 CDW. All Rights Reserved