United States Cybersecurity Magazine

ProcessBolt
From the Spring 2022 Issue

Information Warfare and Government Policy: Creating a Holistic U.S. Cyber Posture Through Cyber Survivability

Author(s):

Jessica Trombley-Owens, Vice President, System & Mission Engineering, PLEX Solutions, LLC

The Next Pearl Harbor The former director of the CIA and once Defense Secretary, Leon Panetta, warned of the possibility of a “cyber-Pearl Harbor”. More specifically he referenced the use of both cyber and physical attacks on key military and critical infrastructure systems that would result in grave detriment to the U.S. and that the … Read more

From the Fall 2020 Issue

You are Violating my Privacy

Author(s):

Joy Akurienne Coker, Attorney Editor, Thomson Reuters

Privacy

You are violating my privacy! This is a phrase typically thrown around without an understanding of what privacy really means and whether it applies in a situation or not. The prerequisite and necessity for privacy are clearly illustrated with the Internet of Things (IOT), a system that now permeates every facet of our modern lives. … Read more

How to Write a Cybersecurity Policy For Your Company

Author(s):

Chloe Bennet, Cybersecurity Manager, Fast Assignment Help, Write My Dissertation Cheap, Help With Homework

Group of employees being briefed on the Cybersecurity Policy

Cybersecurity is one of those areas that executives frequently overlook. However, it is hugely important. The problem usually lies with the speed at which technology develops and the ease with which fields within technology evolve. People who are looking to exploit new technology stay up to date with the latest innovations. In contrast, those who … Read more

From the Winter 2016 Issue

The Future of Cyber Coverage Disputes

Author(s):

Thomas Bick, Chair, Insurance Coverage Specialty Team, Butzel Long P.C.

These days businesses large and small are trying to decide whether to buy insurance against data breaches and other kinds of “cyber liability.” They must also determine the type and degree of coverage that they need. Those decisions will no doubt be complicated by disputes between insurers and policyholders over the intended coverage provided by … Read more

From the Winter 2016 Issue

DFARS Implementation and Compliance: The New Interim Rule

Author(s):

Christine Kinyenje, Founder and Principal Consultant, CKSecurity Solutions

In response to recent Executive orders and mounting pressure after high-profile government data breaches, the Department of Defense (DoD) approved an interim rule Defense Federal Acquisition Regulation Supplement: Network Penetration Reporting and Contracting for Cloud Services for the Defense Federal Acquisition System (DFARS Case 2013–D018), taking immediate effect. The rule, which will affect many government … Read more