United States Cybersecurity Magazine

ProcessBolt
From the Winter 2020 Issue

ARE WE TRYING TO OUT-“SMART” OURSELVES?

Author(s):

-Larry Letow, President, U.S. Region, CyberCX

Justin Petitt, Director of Cybersecurity, Systems Engineering Solutions Corporation

smart cyber society

Not all that long ago, “Cyber” was a word that acted as a placeholder, standing in the place of super-specialized knowledge set and complex systems better left to experts. Cyber was too far removed from the day-to-day for the average person when personal records, bills, bank statements, health records and more were handled by paper. … Read more

From the Winter 2020 Issue

Doing More to Support Those Residing in Assisted-Living or Eldercare Facilities with Cybersecurity and Cybercrime Prevention

Author(s):

Stan Mierzwa, Managing Assistant Director, Center for Cybersecurity, Kean University

Elderly Cyber Crime Prevention

Introduction As the U.S. population continues to age, those entering senior living arrangements will continue to grow and with that potential this population is more likely to be the regular users of computers, laptops, smartphone/tablets and Internet. The U.S. Census reports that as of 2016, 86.9% of older Americans aged 65 to 74 have computer … Read more

From the Winter 2020 Issue

Threat Modeling: Methodologies, Myths, and Missing Perspectives

Author(s):

Hilary MacMillan, EVP for Engineering, CyLogic

Threat Modeling

On April 10, 2014, citizens of Ghaziabad, a city near Delhi, India, cast their ballots for parliamentary elections using electronic voting machines. The machines – and the votes they held – had to be stored in a secure location for a month, until vote counting was set to begin.  When planning, election officials accounted for … Read more

From the Winter 2020 Issue

Identity and Transmission Based Authentication

Author(s):

Danny Gershman, Vice President, Security Operations, F9 Teams, Inc.

Authentication

How people work has changed significantly in the last five, ten, twenty years. Furthermore, there was a time when people would go out to a field to farm or go to a physical factory for wages. However, with the invention of the microprocessor and the rapid speed in which that has advanced application capability, so … Read more

From the Winter 2020 Issue

A Short History of Mac Malware

Author(s):

David Balaban, Editor, Privacy PC

Mac Malware

Do Mac viruses exist? In a nutshell, yes. Wondering why? Here’s the thing: lots of people refer to all forms of malicious code as viruses. Strictly speaking, this is a misconception because computer viruses are programs that exhibit self-replication capabilities. However, there is an aspect that blurs the categorization. Present-day malware can be modular, which … Read more

From the Winter 2020 Issue

Outsourcing Your Security Operations Center and Why It Makes Good Sense

Author(s):

John Price, Chief Executive Officer, SubRosa Cyber Solutions

SOCaaS Outsourcing

2019 saw more than its fair share of data breaches, including numerous mega breaches that were considered newsworthy. These breaches were costing organizations hundreds of millions of dollars and affecting billions of consumers across the globe. 2019 also saw many smaller, but just as damaging breaches. The breaches affected retail companies like Macy’s and Saks … Read more

From the Winter 2020 Issue

Enhancing Cybersecurity with Artificial Intelligence

Author(s):

Philip Chan, Ph.D., University of Maryland UMUC UMGC / U.S. Army Futures Command (AFC)

Artificial Intelligence

Daily human life is impacted by Artificial Intelligence (AI). More and more enterprises are using AI for their needs; the time sets to analyze the right implementation of AI in the area of the cybersecurity field. There are many positive uses of AI for cybersecurity applications. Biometric applications are typically and increasingly used in commercial … Read more

From the Winter 2020 Issue

Reassessing the Cyber Workforce Gap

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

AF Workforce Gap image

Epidemiology, with respect to public health, is often used as an analogy when discussing cybersecurity.  The two are strikingly similar, encompassing notions of impacted populations, specialist expertise, containment, and cure. Education is acknowledged as a primary means of reducing epidemiological risk, especially with respect to HIV/AIDS.1  It has this effect by generating an ability to … Read more