Travis Norris

Vice President & COO | DataComm Networks Inc.

tnorris@datacomm.com

Travis Norris, a graduate of the University of South Florida, joined DataComm in 2001. In 2008, along with business partner Brian Boyer, he purchased DataComm. Now serving as Vice President and Chief Operating Officer for DataComm, Travis looks to utilize his long tenure combined with new ideas to continue DataComm’s growth. Travis has energized DataComm – concentrating on standardizing operations, maintaining positive cashflow, generating an employee-focused culture, and staying up to date with the latest technology trends to lead DataComm and continue a track record of prosperity. He is always looking for better ways for DataComm to conduct business and has put those ideas to good use, centering on implementing technologies that improve process and security. The “do-it” attitude has always guided him and it is initially met with apprehension. He has transformed many that initially would say that they “Can’t do it” to “Can’t do it yet.”

Author Posts

Update Fatigue: How the relentless pace of software updates is breaking user trust — and what organizations can do about it

Somewhere between the fourteenth update notification of the week and the third forced restart during a critical deadline, something breaks. Not the software — the user. They click "Remind me later." Then again. And again. Eventually, they stop updating altogether. This is update fatigue — and it's quietly becoming one of the most significant and underappreciated vulnerabilities in organizational cybersecurity today.

Project Glasswing: What It Means for Critical Infrastructure, AI Risk, and Cyber Defense

Project Glasswing shows how AI-driven cybersecurity is reshaping the defense of critical software and infrastructure. This article explores Anthropic’s initiative through the lens of the NIST AI RMF Playbook, the FDIC’s cybersecurity guidance, and what regulated organizations should do now to govern AI-enabled vulnerability discovery, strengthen resilience, and reduce risk. It also explains how DataComm can help turn AI security promise into a practical, compliant strategy.

Increasing Technology Costs: What You Need to Know

Technology costs are climbing as vendors respond to rising memory prices, supply constraints, and growing AI-driven demand. This article explores what those increases mean for budgeting, procurement, and IT planning, and how businesses can take a more strategic approach to managing technology investments with help from DataComm.

Mitigating the AI Security Threat: A Practical, Standards-Aligned Playbook

Mitigating AI security threats requires more than traditional cyber controls. Using NIST AI RMF and financial-services guidance, this article covers governance, threat modeling, testing, and monitoring—plus lessons from incidents involving Samsung, Amazon, Arup, and T-Mobile. Includes a practical checklist, FAQ, and how DataComm can support your program.

Strengthening the Human Element: The Most Underestimated Cyber Defense

Cybersecurity isn’t just a technology problem—it’s a people problem. Attackers increasingly rely on social engineering, phishing, and business email compromise to exploit trust and urgency, leading to costly mistakes. Strengthening the “human element” means building a culture of pause-and-verify, reinforcing role-based training for real-world scenarios, and designing simple processes that prevent errors before they happen. With the right mix of habits, safeguards, and measurement, organizations can reduce risk quickly—and DataComm can help you turn awareness into lasting, measurable defense.

Supply Chain Risk Management (SCRM)

Mitigating risk across hardware, software, cloud services, and third-party ecosystems Supply chain risk now extends beyond hardware and on-premises software. Organizations rely on cloud service providers, SaaS platforms, managed service providers, and their subprocessors. Compromise of any upstream dependency can affect your environment, often through legitimate channels like APIs and delegated access. NIST SP 800-161 […]

Zero Trust Network Access (ZTNA): Why Modern Organizations Need a New Approach to Application Security

Hybrid work, SaaS adoption, and cloud migration have weakened traditional security perimeters. Effective protection now depends on dynamic, identity- and device-aware access. ZTNA enables application-specific, session-based permissions, reducing risk and limiting lateral movement. Zero Trust, According to NIST NIST Special Publication 800-207 describes Zero Trust as a set of cybersecurity paradigms that treat the network […]

Preparing for the Post-Quantum Era

How DataComm is future-proofing encrypted communications with post-quantum cryptography (PQC) Quantum computing is advancing rapidly and could, within the coming decade or two, enable attacks that break widely used public-key cryptographic algorithms like RSA and elliptic-curve cryptography (ECC). While no quantum system today can defeat modern encryption, adversaries may already be collecting encrypted data for […]

SIEM, XDR, and Threat Intelligence—A Critical Layer of Security for Financial Institutions

Strengthen your financial institution’s defenses with integrated SIEM, XDR, and threat intelligence. Discover how these advanced security layers enhance detection, response, and risk reduction across highly regulated environments.

The Human Element in Information Security

Learn how remote work, evolving threats, and Human Element in Information Security shape today’s cybersecurity risks—and how organizations can build a culture that stops attacks before they spread.

Latest posts

Technology Trends
Travis Norris

Update Fatigue: How the relentless pace of software updates is breaking user trust — and what organizations can do about it

Somewhere between the fourteenth update notification of the week and the third forced restart during a critical deadline, something breaks. Not the software — the user. They click “Remind me later.” Then again. And again. Eventually, they stop updating altogether.

This is update fatigue — and it’s quietly becoming one of the most significant and underappreciated vulnerabilities in organizational cybersecurity today.

Read More ⇾
Kofi's Korner - Insights from DataComm's Technical Solutions Team
Kofi's Korner
Kofi Kankam

Kofi’s Korner April 2026

Rising technology costs, evolving cyber threats, and increasingly complex IT environments are forcing organizations to rethink how they plan, protect, and scale their infrastructure. In this edition of Kofi’s Korner, we explore what’s driving today’s unpredictable pricing landscape, how a layered security approach strengthens resilience, and why solutions like SecurShield IDS/IPS are critical in a firewall-first world. Discover practical insights and strategies to help your organization stay secure, compliant, and ahead of what’s next.

Read More ⇾

SecurNOC

Monitor your network devices and view their configuration changes.

SecurPortal

A live look at your events, security event charts and tickets.

Ticketing Portal

Login here to easily add and managed trouble tickets.

Remote Support

Let DataComm remotely access your computer to render aid.