United States Cybersecurity Magazine

ProcessBolt
From the Fall 2015 Issue

California Gold: Cybersecurity’s Emerging Epicenter

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

A Truth Universally Acknowledged  That cybersecurity is a necessity for individuals, organizations, and governments across all nations and walks of life is easy enough to agree upon. “Cybersecurity has no boundaries,” explained Alberto Yepez, a Managing Director at Trident Capital and member of the California Cybersecurity Task Force’s Economic Development Subcommittee. “It’s a global problem. … Read more

From the Fall 2015 Issue

Veterans: The Short Answer to the Cybersecurity Shortage

Author(s):

Kathleen Smith, Chief Marketing Officer, ClearedJobs.net

We hear frequently that there is a cybersecurity workforce shortage. While there are many great programs in progress to enhance the technical skills of our future workforce, they are still not enough to meet the current need in the United States. Meanwhile, despite the fact that we have the most trained and skilled military workforce … Read more

From the Fall 2015 Issue

Securing Social: ZeroFOX’s Approach to Cybersecurity in the Facebook Age

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

What’s the most populous country in the world? China, with 1.36 billion people? India, with 1.25 billion? If you answered either of those countries, you’re wrong. The most populous country boasts 1.49 billion people, has only been around since 2004, and you yourself are probably a citizen.1 Guessed it yet? It’s Facebook. According to the … Read more

From the Fall 2015 Issue

Building the Cyberforce of the Future

Author(s):

Christen Marie Smith, Program Manager, LMI

The Force of the Future  The eyes of the Department of Defense are on the future— specifically, the force of the future. This spring, Secretary of Defense Ash Carter announced a far-reaching initiative to update the ways in which we attract, recruit, develop, utilize, support, and retain skilled personnel to bolster the national security mission.1 … Read more

From the Fall 2015 Issue

The Role of Social Networks in Securing Cyberspace: Opportunities and Threats

Author(s):

J. L. Billingsley, Advisory Board Member, Cyber Security Forum Initiative

Many in American society today equate social networks with online communities such as Google+ and LinkedIn. However, social networks have existed since the dawn of man. While the prominence of social networks continues to grow and has proven to be a rich research area, we already know a lot about their characteristics. For those of … Read more

From the Fall 2015 Issue

Staying a Move Ahead in Cyber-Chess

Author(s):

Dr. Alenka Brown, President , McClure, Brown & Associates LLC

Dr. Joe McClure VanHoozer, Founder, McClure, Brown & Associates LLC

Mr. Jason Christman, MS, CISSP, PMP, Subject Matter Expert, McClure, Brown, & Associates® LLC

Neurocognitive Patterns in Cyberspace  Humans process somatosensory information – defined by Kandel, et al as “different forms of energy…transformed by the nervous system into different sensations or sensory modalities: vision, hearing, touch/emotion, taste, and smell”1 – at several levels simultaneously. This information, composed of neuro psychometric indicators (NPI) – the verbal and non-verbal cues of … Read more

From the Fall 2015 Issue

Social Engineering: The Root of the Cyber Threat

Author(s):

Douglas Rausch, President, Aurora CyberSecurity Consultants, Inc.

R. “Montana” Williams, Founder and Managing Partner , Titan Rain Cybersecurity, LLC

When conducting reconnaissance of your cyber infrastructure, attackers look for weaknesses they can utilize to successfully penetrate your infrastructure with the least expenditure of resources and risk of being detected. The vulnerabilities created by human action or inaction have always been a potential attack vector. The increased focus on adding technical controls to bolster cyber … Read more

From the Fall 2015 Issue

Navigating the Cybersecurity Workforce Development Landscape

Author(s):

Michael Volk, Cybersecurity Specialist, PSA Insurance & Financial Services

The increasing need for advancements in cybersecurity creates new business opportunities, impacts the way mature organizations operate, and changes the way individuals conduct their personal and professional lives. These conditions create tremendous opportunities for organizations and jobseekers alike. However, due to the nature of the cybersecurity workforce landscape, jobseekers often have a difficult time understanding … Read more

From the Fall 2015 Issue

INSPIRING OUR FUTURE STEM WORKFORCE

Author(s):

Clark ‘Corky’ Graham, Ph.D., Founder & CEO, LET’S GO Boys & Girls, Inc.

THE STRUGGLE OF SUPPLY & DEMAND WITHIN THE STEM WORKFORCE In 2013, President Obama drew attention to the growing importance of science, technology, engineering, and mathematics (STEM) careers in our country. In the President’s five-year strategic plan for STEM education, the National Science & Technology Office recognized the increasingly important role that STEM plays in … Read more

From the Fall 2015 Issue

Why Education in the Law and Policy of Cybersecurity Is a Must

Author(s):

Markus Rauschecker, J.D., Cybersecurity Program Manager, University of Maryland Center for Health and Homeland Security

Cybersecurity is no longer within the sole purview of information technologists –its increased prominence has made it an interdisciplinary problem. Solutionsrequire involvement from many stakeholders. Organizational leaders, includingCEOs, financial and privacy officers, lawyers, human resources specialists,policymakers, and many others in both the public and private sectors, mustall have a basic understanding of cybersecurity issues if … Read more