United States Cybersecurity Magazine

ProcessBolt

A Brief and Incomplete History of Cybersecurity

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Cybersecurity History, evolved, evolution of man, blue men, computer, cyber

Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However, cybersecurity history dates back to the seventies, before most people even had a computer. We have covered hacking incidents that took place before computers, but for the purposes of this article, our timeline starts in 1971, with an experiment. … Read more

Watering Hole Attacks: The Tainted Oasis

Author(s):

Josh Henry, ,

Antelopes at a Watering Hole in the desert drinking

Watering Hole Attacks: The Tainted Oasis Watering hole attacks are still wreaking havoc on targeted groups and institutions around the globe. These attacks target major corporations and financial institutions. However, now they are penetrating these corporations’ servers by trapping a single user. The Name In the wild, there are many predators that lurk in the … Read more

Top 10 Cybersecurity Risks For 2019

Author(s):

Duncan Kingori, ,

2019 Cyber Risk Man Assessing Servers Blue Illustration Password

2019 Risks Cybersecurity reports by Cisco show that thirty-one percent of organizations have at some point have encountered cyber-attacks on their operations technology. Cybersecurity breaches are no longer news. It is a topic that is finally being addressed due to the intensity and volume of attacks. 2019 is a fresh year and you can be sure … Read more

“DND”-R: Giving your Disaster Recovery Strategy a Dungeon Master.

Author(s):

Tricia A. Howard, ,

Dungeons and Dragons dice roll, disaster recovery.

Disaster Recovery (DR) has always been a very comprehensive and multi-departmental undertaking. This has only increased in connectivity in the digital age. With so many devices being connected to the network now, it is beyond the traditional natural disasters and power outages. We must view network security as an integral piece of any disaster recovery … Read more

The Netflix Sharing Problem

Author(s):

Zia Hayat, CEO, Callsign

Red Head Woman watching Netflix on her Smart TV, Watching Daredevil, Options on the Bottom of TV like Daredevil, Black Mirror, Peaky BLinders, Glitch, The Crown, etc.

Netflix Has a Problem With Password Sharing. We have all heard the story of the college grad using his former roommate’s parents’ Netflix password. We all know the ex-boyfriend binging his favorite shows with his ex-girlfriend’s account credentials. Many consider the sharing economy a positive thing. However, Netflix, Hulu, Amazon, HBO and others are literally … Read more

The Dark Side of AI

Author(s):

Josh Henry, ,

AI The Dark Side of AI, Artificial Intelligence, AI concept, Brain on motherboard

The rise of AI is as inevitable as the next data breach.  The 21st century has seen a massive resurgence in highly advanced AI usage techniques. We can now process large amounts of data in a short amount of time. We can use machine learning to help machines improve on their mistakes. In fact, we … Read more