United States Cybersecurity Magazine

ProcessBolt
From the Fall 2014 Issue

Maryland – Cash Investments and Tax Credits Add Up to Business Success for Cybersecurity Companies

Author(s):

Andrew L. Bareham, CPA, MST, Principal, State and Local Tax (SALT) Chair, KatzAbosch

The Internet Age has changed the business environment in the world. For instance, Silicon Valley in California has become the home to many high-tech business giants. New businesses attracted to Silicon Valley have brought high-paying jobs and with the jobs comes tax revenue for the state. With the changeover from a manufacturing economy to a … Read more

From the Fall 2014 Issue

Market Intelligence: The Key to Government Business Development

Author(s):

Kim Harwell, National Procurement Manager, National Bid Network/GovPurchaseUnited

Increasingly, every day of every week, of every month, of every year, more business is being conducted online. Federal, state and local government prime contracting, subcontracting and teaming are no exception. In fact, most government contracting opportunities and research is now available online and easily accessible. The key is to know the proper techniques and … Read more

From the Fall 2014 Issue

5 Things to Do Today to Increase the Value of Your Government Contracting Business

Author(s):

Pat Lowry, MBA, ASA, CVA, , Patuxent Valuation Group LLC

Realtors are asked for their tips on selling homes, chefs are asked for their secret spices, and cops are asked how to get out of speeding tickets. Me? I’m constantly asked what’s most important to increasing the value of someone’s business. 10 years of experience consulting with and valuing government contracting businesses – some that … Read more

From the Fall 2014 Issue

Hunting with Cyber Threat Intelligence

Author(s):

Robert S. Johnston, ,

Do the current techniques to conduct incident management and response constitute an effective counter threat operation?  In today’s threat landscape, chasing down alerts from your SEIM may not be enough to catch the most advanced threats.  Today’s Advanced Persistent Threats (APT) link sociological, psychological, and technical tradecraft together to infiltrate the  most secure networks, and … Read more

From the Fall 2014 Issue

Corporate America is Being Attacked and the Entry Vector May Be Surprising

Author(s):

Rick Mellendick, Chief Security Officer, Process Improvement Achievers, LLC

“Corporate America is under attack” has become a more regular headline with media outlets. Such reports often describe the attack and loss, but few explain why it happened and even fewer take the time to describe how not to let it happen. Even organizations focus on the attack, loss, and why the attack happened when … Read more

From the Fall 2014 Issue

Cloud Vulnerability – Scanning Options for Enterprises

Author(s):

Kellep A. Charles, Information Security Analyst/Researcher, SecurityOrb, LLC

Many enterprises wisely consider regular security vulnerability scans on information processing systems to be a vital component of their security programs. They allow the administrator to locate security weaknesses, assist in asset management and, most importantly, comply with regulatory compliance. In a traditional environment, the process is not difficult to carry out, but with the … Read more

From the Fall 2014 Issue

Cybersecurity Culture and Compliance

Author(s):

Dr. Mansur Hasib, CISSP, PMP, CPHIMS, Public Speaker and Cybersecurity Leader,

CYBERSECURITY DEFINED While attending several cybersecurity conferences recently I noticed a lack of a common understanding of what cybersecurity is. I also noticed some confusion between cybersecurity and information assurance. I observed that many cybersecurity professionals and even NIST documents were advocating cybersecurity policy based on the 1991 McCumber model of information security (McCumber, 1991) … Read more