United States Cybersecurity Magazine

ProcessBolt
From the Spring 2022 Issue

U.S. Army C5ISR Center CSSP: Leading the Way to a Defend Forward Stance

Author(s):

Bill Christman, Chief, Defensive Cyber Solutions Branch

Cesar Pie, Strategist, Defensive Cyber Solutions Branch

Clinton Hackney, Strategist, Defensive Cyber Solutions Branch

Greg Weaver, Team Lead, Defensive Cyber Solutions Branch

DOD CSSP Program: A Plateau Difficult to Overcome Since its establishment in 2001, the Department of Defense (DOD) Cybersecurity Service Provider (CSSP) Program (hereafter Program) has progressively and systematically matured to become one of the most critical components of the Department’s Defense–in–depth strategy. Today, 27 authorized (certified) DOD CSSPs are responsible for provisioning 24x7x365 cybersecurity … Read more

From the Summer 2021 Issue

Chesapeake Science & Security Corridor Supports Army Readiness, Resilience Through Networked Defense Industry Base and CMMC Framework

Author(s):

Karen Holt, Deputy Director and Federal Installation Administrator, Harford County Government, MD

Chesapeake-Science-&-Security-Corridor-Supports

The Chesapeake Science and Security Corridor (CSSC)’s epicenter is Harford County, MD, home to Aberdeen Proving Ground (APG). Inside the gates of this 100+ tenant Department of Defense (DoD) Research, Development, Test & Evaluation (RDT&E) megabase are six Centers of Excellence including C5ISR, and the highest concentration of advanced degrees on a U.S. military installation. … Read more

From the Winter 2015 Issue

SCHSIM: Immunizing Software Systems Against Hacking

Author(s):

Dr. Sunny Fugate, , SSC Pacific

Patric Petrie, Lead Staff Writer, SPAWAR Systems Center Pacific

The benefits of the same software used everywhere has made our systems vulnerable to criminals and nation-state adversaries alike.  Background  Software is vulnerable to cyber threats due to defects of design, development, and deployment. One of the many challenges posed by current software is balancing security and cost. In most cases the deployment and maintenance … Read more