United States Cybersecurity Magazine

ProcessBolt
From the Winter 2014 Issue

Cost Effective Security Assessments in Remote Locations

Author(s):

Gabe Koss, , Pwnie Express

Imagine a large bank. It has large corporate offices in several major cities in the United States and over 1000 branch offices across the country. It even has international branches. All of these different locations mean the bank functions on a large-scale, distributed infrastructure.  Being a bank, like government institutions, they are subject to varying … Read more

From the Winter 2014 Issue

UNIQUE ISSUES IN CYBERSECURITY MERGERS & ACQUISITIONS FOR THE GOVERNMENT CONTRACTOR

Author(s):

Donald J. Walsh, Esq., Chair Government Contracting Practice Group, Offit|Kurman, P.A.

Although the economy may have been on a rollercoaster for several years, one consistent growth market has continued to be government contracting. Despite recent sequestration and budget cuts, the stability of revenues for the vast majority of government contractors has led to considerable Mergers & Acquisitions activity over the past few years. Nowhere is this … Read more

From the Winter 2014 Issue

Northrop Grumman and bwtech@UMBC Graduate First Three Companies from Innovative Cyber Cync Program

Author(s):

Marynoele Benson, , Northrop Grumman

Small-business initiative generates cutting-edge cyber technologies to meet tomorrow’s global threats  Northrop Grumman Corporation and the University of Maryland, Baltimore County’s Research Park Corporation – also known as bwtech@UMBC – hosted a ceremony this fall for the first graduating class of the Northrop Grumman-sponsored Cyber Cync Program: AccelerEyes, Five Directions and Oculis Labs. The event … Read more

From the Winter 2014 Issue

It’s Time for a New Approach to Mitigate Insider Threats

Author(s):

Richard Park, Director of Product Management, Hexis Cyber Solutions

Recent high-profile national security breaches, such as the Edward Snowden and Bradley Manning cases, underscore the need for a new approach to detecting and mitigating insider threats. One emerging trend is the importance of big data security analytics and automated response. In a March 2012 report Gartner states that “information security is becoming a big … Read more

From the Winter 2014 Issue

The New Energy Landscape: What Leading Companies Need To Know

Author(s):

Emile Trombetti, Senior Vice President, Booz | Allen | Hamilton

Today’s oil and gas executives often take advantage of emerging energy trends and opportunities when assessing business objectives or striving to differentiate products and services in their highly competitive industry. The trends also influence how leaders across the oil and gas enterprise make decisions in an interconnected landscape of risks and rewards, whether they are … Read more

From the Winter 2014 Issue

CYBERSECURITY AND THE ENERGY SECTOR A Question & Answer Interview with AREVA, Inc.

Author(s):

Maryann Healy Horn, ,

AREVA, Inc. addresses the challenges of helping to protect U.S. energy infrastructure from exploitations and cyber threats. To answer some pertinent questions for our readers about AREVA, Inc., Cybersecurity, and the energy sector, the United States Cybersecurity Magazine conducted a Question & Answer interview with AREVA, Inc. The questions were answered by Erik Dorman, Manager … Read more

From the Winter 2014 Issue

InfraGard’s About Face

Author(s):

Anne Helms, , Federal Bureau of Investigation

In support of the FBI’s mission to dismantle top U.S. criminal and terrorist threats, the Bureau’s InfraGard alliance is making strides—synching the diverse expertise, strategies, and intelligence of government, law enforcement, and public-private sector partners. Partnership as a key resource As Americans, our lifestyle, economy, and national security are supported by a complex framework of … Read more

From the Winter 2014 Issue

Homegrown in Harford County, MD – A Technology Base for the Future

Author(s):

Eric Mc Lauchlin, Chairman, Harford County Economic Development Advisory Board

James C. Richardson, Director of Economic Development, Harford County, Maryland

Technology is perhaps one of the most overused terms in today’s society. Everything is “technology-based” or “technologically advanced.” One of the best explanations of technology comes from a definition for young people and refers to its interaction with life, society and the environment. An article at www.getaheadkids.com.au notes that technology must exist “to contribute to … Read more

From the Winter 2014 Issue

Securely Enabling Bring Your Own Device (BYOD)

Author(s):

Jonathan Halstuch, End User Computing Architect, RackTop Systems, LLC

Companies are allowing and embracing Bring Your Own Device (BYOD) policies within the organization for a multitude of reasons. Reasons for implementing BYOD include increased productivity, simplifying IT, response to employee demand and of course the most popular reason, cost savings. To that end it is important when undertaking the implementation of a BYOD strategy … Read more