United States Cybersecurity Magazine

ProcessBolt
From the Fall 2020 Issue

Letter From the {Publisher}

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Greetings, Welcome to the Fall 2020 issue of the United States Cybersecurity Magazine! As always, we’d like to take a moment to thank our supporters, subscribers, sponsors, contributors, and everyone else who makes the magazine possible. All of us here at the United States Cybersecurity Magazine remain committed to bringing you, our readers, the best … Read more

From the Fall 2020 Issue

Letter From the Editor-in-Chief

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, This Fall 2020 issue brings us around to another National Cyber Security Awareness Month (NCSAM). The Cybersecurity and Infrastructure Security Agency (CISA) describes NCSAM’s goal as raising “awareness about the importance of cybersecurity across our Nation, ensuring that all Americans have the resources they need to be safer and more secure online.” That’s a … Read more

From the Fall 2020 Issue

Remote Workforce, Insider Threats, and the Pandemic

Author(s):

-Larry Letow, President, U.S. Region, CyberCX

Justin Petitt, Director of Cybersecurity, Systems Engineering Solutions Corporation

Remote Workforce Feature Image

The COVID-19 pandemic requires organizations and individuals to embrace new practices such as social distancing and remote working. While the world is focused on the health and economic threats posed by COVID-19, cyber-criminals around the world are actively capitalizing on this crisis. Organizations around the world have instituted remote, work-from-home policies. While some organizations have … Read more

From the Fall 2020 Issue

Change Management: Encounters of a Strategic Security Kind

Author(s):

Amy Kissinger, MS Cyber Security 2020 Graduate, Author

Kissinger-feature

Strategy is Tiered and Targeted Over Time Change Management for enterprise security sensitivity or awareness involves strategically framing the internal and external environment. Within this framework, there must be a clearly defined external villain as well as internal security heroes of an organization.[1] For an example of directed strategy, we can look no further than the … Read more

From the Fall 2020 Issue

Ransomware Data Leaks Timeline

Author(s):

David Balaban, Editor, Privacy PC

Ransomeware

The cyber-extortion plague involving file-encrypting ransomware has hit some major roadblocks since it went pro in 2013. It survived a series of successful law enforcement operations, a sharp turn toward the enterprise as the primary target, and the cryptojacking boom that eclipsed ransomware in terms of potential profits. Having gone through a lot of trial … Read more

From the Fall 2020 Issue

Incident Response: Making the Most of the Work Product Doctrine in Litigation

Author(s):

Razvan Miutescu, Privacy Counsel, Whiteford, Taylor & Preston

Data Protections Laws

(This article is an updated version of a prior publication to reflect new legal developments.) Organizations in the United States face a growing web of complex foreign, federal, and state privacy and data protection laws that apply to their operations. Running afoul of these laws, particularly in the context of a data breach, is met … Read more

From the Fall 2020 Issue

You are Violating my Privacy

Author(s):

Joy Akurienne Coker, Attorney Editor, Thomson Reuters

Privacy

You are violating my privacy! This is a phrase typically thrown around without an understanding of what privacy really means and whether it applies in a situation or not. The prerequisite and necessity for privacy are clearly illustrated with the Internet of Things (IOT), a system that now permeates every facet of our modern lives. … Read more

From the Fall 2020 Issue

The Convergence and Mutual Opportunity of Bio and Cybersecurity

Author(s):

David Anderson, VP, PMO, SimplyPeer

biosecurity and cybersecurity

We are now entering a realm where cybersecurity and biosecurity are forced to converge and evolve rapidly. Digitizing immense amounts of scientific and research data within the life sciences has made cyber threats as concerning, if not more, than the biological risks themselves. This overlap has created a need for cyber biosecurity. By working together, … Read more

From the Fall 2020 Issue

Don’t Take Your Home for Granted: Dangers Lurking Inside and Out

Author(s):

Dr. Sandra Adside Wright, CISSP, CAP | Member, Women in Cybersecurity Mid-Atlantic Affiliate, Engineering Solutions Incorporated (ESI)

Smart Home

You Thought you Were in Control of your House There are more wireless computers on home networks today since the onset of Covid-19 swept across America, forcing the convergence of work-from-home and distant learning to a new dimension. This evidently means an expected increase in malware and nefarious attacks against our personal and professional computing … Read more

From the Fall 2020 Issue

Data Correlation for National Resilience

Author(s):

Dr. Scott Jasper, Senior Lecturer, Captain, U.S. Navy, Retired, Naval Postgraduate School

Data Correlation for National Resilience

A pillar of the March 2020 Cyberspace Solarium Commission report is to promote national resilience to deny adversaries the benefit of their cyber operations.[1]  This ambition is consistent with the Department of Homeland Security’s vision to increase security and resilience across government networks and critical infrastructure.[2]  While the term security means the capacity to prevent … Read more