United States Cybersecurity Magazine

ProcessBolt
From the Winter 2016 Issue

Cybersecurity Takes the Right Person

Author(s):

Don Watson, CISSP, Senior Cyber Instructor/Senior Software Engineer, VOR Technology

There is unprecedented demand right now for qualified cyber specialists to fill the ranks of government and civilian positions.1 Although there are many people with expertise in advanced computer and network technologies, many of these workers lack experience in the security-related aspects of these technologies. As a programmer I wasn’t taught how to write secure … Read more

From the Winter 2016 Issue

How to Gain Allies and Infuence Your Services Team’s Success

Author(s):

Michelle Covert, Manager, Production Support SILA-C, Vertafore

The information security and customer service groups within an organization often make for odd bedfellows, due to the competing and often divergent goals between the two groups. Security teams’ goals are to protect and prevent the loss of customer data, information, proprietary code, or practices; services teams are focused on resolving customer-reported issues as quickly … Read more

From the Winter 2016 Issue

Cybersecurity Education’s Cargo Cult

Author(s):

Mark R. Heckman, Ph.D., CISSP, CISA, Professor of Practice, Shiley-Marcos School of Engineering University of San Diego

During the Second World War, isolated island natives in the South Pacific observed how easily Allied military personnel based on the islands could obtain food and other supplies. The soldiers put on headsets, spoke into microphones, and airplanes soon appeared carrying the valuable cargo. When the war ended and the islanders were isolated once again, … Read more

From the Winter 2016 Issue

Cyber Literacy in the Age of Attacks

Author(s):

Dr. Jane A. LeClair, President, Washington Center for Cybersecurity Research & Development

Understanding personal computers’ hardware, operating systems, and applications is a good first step towards obtaining the knowledge and skill necessary for cyber literacy.  Much of the existing cybersecurity literature centers around defending the complex digital systems belonging to large corporations. Much less attention is paid to providing the average user with the basic knowledge and … Read more

From the Winter 2016 Issue

Multinationalism in Digital Forensics

Author(s):

Paul Kubler, Head of Red Team Operations, CYBRI

Native-language tools and exploits have recently started gaining momentum in the ever-growing sphere of multinational cybercrime, as hackers develop tools in their own language. It’s common knowledge that much of the malware discovered today has been written by foreign language-speaking authors. In a speech to the Australian National Press Club two years ago, Eugene Kaspersky … Read more

From the Winter 2016 Issue

ASK THE EXPERTS: Seven Global Leaders Advise on Digital Risk

Author(s):

Daren Dunkel, Chief of Staff, McAfee

“The time for complacency is over. Every company is vulnerable to cyber-attacks and directors have a responsibility to ensure that resources are deployed to detect and defend against them.”  – Nicole Eagan, CEO of Darktrace  In 2015, senior executives and their board members were challenged with cybersecurity threats to their businesses that their predecessors never … Read more

From the Winter 2016 Issue

Rejecting Anonymity: Confronting the Internet’s Insecure Architecture

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

In @War: The Rise of the Military-Internet Complex, Shane Harris wrote:  The Internet offered a cloak of anonymity. Anyone could set up an e-mail address with a fake name using Google or Hotmail, which had millions of customers and kept their data in repositories located around the world. Those people were hard enough to find. … Read more

From the Winter 2016 Issue

from the{PUBLISHER}

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Karen Austin

Greetings,   As 2016 begins, we look forward to yet another year of publishing solutions which contribute to a holistic approach to cybersecurity. Cyber-criminality is a vast, multi-faceted problem, a many-headed hydra stretching across the boundaries of land and sea. Our solution must be multi-faceted as well, formulated to tackle the problem on many fronts. Cybersecurity … Read more