United States Cybersecurity Magazine

ProcessBolt
From the Winter 2014 Issue

The Contest for Cybersecurity Professionals

Author(s):

Dr. Christopher V. Feudo, President, University of Fairfax

Globalization is a force for both collaboration and competition. It is also proving to be a contest for resources – both natural and human. In an age during which growth is largely a product of creative and technological advancements, those companies that want to dominate their industries must be able to attract and retain talented … Read more

From the Winter 2014 Issue

CYERSECURITY LIABILITIES, COSTS, AND POTENTIAL SAFE HARBORS

Author(s):

Edward J. Tolchin, Esq., Principal, Cybersecurity and Government Contracting Practice Groups, Offit|Kurman, P.A.

Knowledge of where the law is and where it likely is headed is an important aspect of assessing the financial impacts of Cybersecurity decisions.  The impacts of the law on Cybersecurity corporate planning abound. A few examples will suffice to make the point: the European Commission is considering whether to mandate European Union member states … Read more

From the Winter 2014 Issue

The Data Center of Tomorrow

Author(s):

Mark Gilbert, Director, Business Development, COPT Data Center Solutions

While it might be hard to imagine today, it can be argued that the Data Center of the future will be nothing more than an extremely large USB thumb drive. As absurd as that sounds, with the explosion of connected devices, content creation and Big Data analytics, demand is increasing for storage space. A mind … Read more

From the Winter 2014 Issue

BEST PRACTICES FOR SMALL BUSINESS IN CYBERSECURITY FOR 2014

Author(s):

Maureen Thomas, Editorial Board, GovConnects

(Howard County, MD) It is the time of year for reviewing your business plan for 2014 and making a few updates to improve operations. Your New Year’s Wish List probably includes the government avoiding another shut-down, or sequestration disappearing in 2014, or perhaps that the Pentagon will figure out its budget priorities, or all of … Read more

From the Winter 2014 Issue

Security in a Mobile World

Author(s):

James Screven, Staff Reporter,

Defining the Problem  As the workplace continues to transform and workers continue to seek out non-traditional work spaces, employees will increasingly work more from mobile devices. Laptops, tablets, hybrid convertibles (laptop/tablet) and smartphones have liberated us from the cubicle, while corporations have benefitted from this mobile device revolution through increased productivity. Mobility, albeit liberating, brings … Read more

From the Winter 2014 Issue

CYBER INSURANCE

Author(s):

Gordon M. Mumpower, Jr., CPCU, MBA, President, Commercial Insurance Managers Inc.

Security systems are installed to prevent hackers from unauthorized access into computer networks. Hacking is prevalent by individuals who are employed within or outside companies, groups from around the world, teenage amateurs, sophisticated techies, and your spouse late at night. You purchase the best technology from the smartest and innovative vendors to protect your company … Read more

From the Winter 2014 Issue

IMPACT OF AN IA PROGRAM FROM THE NSA: A STUDENT’S PERSPECTIVE

Author(s):

Daren Dunkel, Chief of Staff, McAfee

Today’s headlines feature stories describing the acceleration and sophistication of organized cyber crime and State sponsored military and industrial espionage. Numerous universities, Think Tanks, businesses, and blogs research the topic and track the latest attacks to suggest countermeasures (defenses) to targeted individuals and organizations. Verizon Corporation has been publishing a Data Breach Investigations Report (www.verizonenterprise.com/ … Read more

From the Winter 2014 Issue

Small Businesses: The Challenges of Securing Networks Without an IT Staff

Author(s):

Paul Ihme, , Visionist, Inc.

Small businesses play a vital role in America’s economy, employing more than 50% of the working population1. As a business grows, so does the volume of data critical to its operation. Given this correlation, how does a growing business secure their critical data (client information, personnel records, etc.) without investing overwhelming amounts of money for … Read more

From the Winter 2014 Issue

Building a Digital Nation through Educational Strategies – A Perspective

Author(s):

Leslie Grove, STEM Bridge Coordinator, National STEM Consortium

The National STEM Consortium (NSC) is a collective of ten community colleges in nine states developed to create and implement five, nationally portable, industry certifications. The certifications include Cyber Technology, Composite Materials, Electric Vehicle Technology, Environmental Technology and Mechatronics. The National STEM Consortium also delivered the STEM Bridge, a two part program established to increase … Read more

From the Winter 2014 Issue

Cyber Attacks Aimed at First Responders

Author(s):

Alan S. Tilles, Esquire, Attorney, Shulman Rogers

Best Practice Checklist Developed for PSAP Lines to Minimize Risks If you are a regular reader of this magazine, you are well aware of the problems that denial of service (DoS) attacks can have on a business or an individual. The dangers of cyber attacks on utilities has been written about and discussed over and … Read more