

Mark Dargin
Mark Dargin is an experienced network and security architect/leader. He has over 18 years of experience designing, managing, and securing complex WAN and LAN infrastructures for large and medium-sized organizations.
Mark’s experience includes leading and managing large scale compliance and risk management initiatives and programs. He is a member of the Michigan Cybersecurity Civilian Corps., a rapid response team of experienced IT security volunteers who will assist the state and industries during major cybersecurity incidents. He is also a graduate of the FBI citizen’s academy in Detroit and a member of InfraGard.
Mark holds a bachelor’s degree in Business Management and Communications from the University of Michigan-Dearborn and a master’s degree in Business Information Technology from Walsh College in Troy, Michigan. He recently completed the Advanced Computer Security Certificate program at Stanford University. Mark holds various active certifications, including the CISSP (Certified Information Systems Security Professional), CCNP (Cisco Certified Network Professional), PMP (Project Management Professional), GIAC GMON (Continuous Monitoring & Security Operations), CCSA (Checkpoint Certified Security Administrator) and ITIL (Information Technology Infrastructure Library).

National pen test execution standard would improve network security
Inconsistent penetration test procedures create gaps and leave vulnerabilities open. A national test execution standard could fix that and ensure networks are equally secure.

Fight for net neutrality rules gains momentum
The U.S. Supreme court’s refusal to remove a lower court’s decision to uphold net neutrality rules could help supporters in future legal battles if the policy is re-introduced.

How to protect your infrastructure from DNS cache poisoning
When your company’s internet access, VoIP and email all depend on DNS, you have to ensure your DNS server is protected against DNS spoofing attacks. One solution: DNSSEC.

Prepare for the future without net neutrality
With the end of net neutrality, it is important for organizations to prepare for any potential changes in their internet service.

What to do if your cloud provider stops offering its services
Any cloud provider can go out of business or stop offering it services, so it is critical to have a contingency plan in place if it happens.

Secure your SDN controller
Security is one of the biggest challenges facing software-defined networks. To prevent unauthorized activity, it is essential that you secure your SDN controller.

Increase your network security: Deploy a honeypot
Deploying a honeypot system on your internal network is a proactive measure that enables you to immediately detect an intruder before any data is damaged or stolen.

Always test remote app performance with a WAN emulator
When you test new applications using a WAN emulator before deployment, you ensure apps perform to remote users’ standards and requirements.

Is protected health information safe in the cloud?
More healthcare providers are storing protected health information (PHI) in the cloud, and certain actions must be taken to secure it.

How to protect your data when using public Wi-Fi
Hackers love public Wi-Fi. Unsuspecting victims often fall into their traps. To protect your data when using public Wi-Fi, follow these four steps.

How to protect against cross-site request forgery attacks
Cross-site request forgery (CSRF) attacks are becoming more sophisticated, but there are many ways you can prevent them.