United States Cybersecurity Magazine

ProcessBolt
From the Summer 2022 Issue

Data Privacy: Regulations, Risks & Practicing Good Cybersecurity Hygiene

Author(s):

Mathew Scott, MCFE, Vice President, Equipment Consulting, J.S. Held

Introduction In a world that revolves around the collection and use of various forms of data, continuously assuring the  privacy of data being collected and stored is a major factor in cybersecurity hygiene, i.e. habitual practices for ensuring the safe handling of critical data and for securing networks. Managing the privacy of one’s data includes … Read more

From the Summer 2022 Issue

Enterprise IoT is Currently Extremely Inadequate – But it Doesn’t Have To Be

Author(s):

Brian Contos, Chief Security Officer, Phosphorus Cybersecurity

The state of Internet of Things (IoT) security across the enterprise and government agencies is shockingly bad. IoT devices are highly vulnerable; therefore, making organizations vulnerable. In many ways enterprise IoT security today is like IT security in the early 1990’s with poor asset inventories, limited patching, and weak credentials, which is to say, enterprise … Read more

From the Summer 2022 Issue

Strategic Cyber Compliance

Author(s):

Mike Shelah, Business Performance Advisor, Insperity

Strategic Cyber Compliance

In March of 2022, after attending a day long cyber conference at the local community college in Carroll County, Maryland,  the featured Keynote speaker for lunch was a risk management specialist, and he shared a brief and powerful story that will now be shared with you. A good friend of his is CIO for a … Read more

From the Summer 2022 Issue

Ukraine is Winning the Cyberwar Against Russia

Author(s):

Alex Haynes, CISO , IBS Software

Ukraine is Winning - Alex Haynes

During the build-up to the illegal invasion of Ukraine in February of 2022, there was consternation among information security professionals about what would happen on the cyber front. The prevailing groupthink at the time was that if countries in the West imposed sanctions, then they would suddenly be subjected to blistering Russian cyber-attacks that would … Read more

From the Summer 2022 Issue

Cybersecurity in the Alamo City: A Global Industry Leader

Author(s):

Jeff Fair, VP, Cybersecurity & Economic Development, San Antonio Chamber of Commerce

Nathan Ramon, Program Assistant, San Antonio Chamber of Commerce

Alamo City

San Antonio has a long history of technological innovation, which has set the course for the city to remain a leader in the cybersecurity industry for decades to come. A contributing factor to the area’s unique success stems from a longstanding military presence, infusing the region with innovators and a trained and ready workforce. Because … Read more

From the Summer 2022 Issue

Using Behavior Profiling to Identify Insider Threats – Part 1

Author(s):

Richard Benack, Principal Investigator, Hiperformance Security

Benack-Su22-feature

INTRODUCTION Organizations often spend significant time, effort and resources protecting their data and systems from external threats such as hackers, foreign spies, hacktivists, and cybercriminals. Internal threats, often called “insider threats”, are often ignored because they are much more challenging for an organization to address. One valuable tool for managing risk around insider threats is … Read more

From the Summer 2022 Issue

Cybersecurity in Banking and Financial Services Industry: Main Threats, Requirements, and Recommendations

Author(s):

Veniamin Simonov, Director of Product Management, NAKIVO

Simonov-Su22-feature

Finance is in the top 3 industries most frequently attacked by hackers, and for a good reason. Banks collect, store, and process personal information to serve clients, which can easily be misused when in the wrong hands. Consequently, a single data breach or loss incident can cost tens of millions of dollars (the Equifax data … Read more

From the Summer 2022 Issue

Cyber Threat Intelligence Shapes the Future of SOC Operations

Author(s):

Dr. Paul de Souza, President, CSFI

CSFI Cyber Threat Intelligence

Cyber threat intelligence is critical for Security Operation Center (SOC) operators because it provides information about the Tactics, Techniques, and Procedures (TTPs) that attackers use to target their organization. This information can help SOC operators map out the adversary’s kill chain and identify potential Indicators Of Compromise (IOCs). Additionally, cyber threat intelligence can help SOC … Read more

From the Summer 2022 Issue

Zero Trust and Cryptanalytically Relevant Quantum Computers

Author(s):

Connie Uthoff, Program Director, The George Washington University

Over the past decade, due to the increase of sophisticated cyber threats and the success of malicious cyber threat actors, it has become increasingly clear that perimeter based cyber defenses have not been effective enough to protect public or private sector organizations.  The SolarWinds breach, the 2021 Microsoft Exchange Server compromise, the Capitol Pipeline and … Read more