United States Cybersecurity Magazine

ProcessBolt

Insider Threats – 2018 Statistics

Author(s):

Zehra Ali, ,

Evil man typing on computer, Insider Threats, cyber criminal.

Insider Threat (Fundamentals) As discussed, the insider threats are not always bred out of malicious nature. In fact, many insider threats exist due to the unintended or accidental happenings. More than 51% of companies are concerned about the unintentional insider attack. However, 49% of the companies are still worried about malicious insider, which do exist and are … Read more

From the Winter 2015 Issue

Cybersecurity’s Three Great Lies – and Five Steps to Avoid the Threats They Enable

Author(s):

Christina Wiegand, Director of Commercial Services, TeleCommunication Systems (TCS) Cyber Intelligence Group

When hackers look for targets, they typically focus on big organizations because they’re the ones with the most credit cards, state secrets and other lucrative hauls, right? Wrong. As the widely reported Target credit card breach shows, hackers often focus on small organizations as a way to attack large enterprises and government agencies. In February … Read more

From the Winter 2015 Issue

Your biggest cyber threat? Naïve end-users

Author(s):

Kelvin O. Medina, Principal Security Consultant, Trustwave

If your end-users lack awareness, your sensitive data will be at risk  Background Approximately 50 percent of all security breaches within the Federal Government are caused by a lack of user compliance, according to a report released last year by MeriTalk and developed in collaboration with Akamai Technologies, Inc.1 This illustrates that even though security … Read more

From the Winter 2015 Issue

Welcome to Security in the 21st Century— Monitoring Employee Behavior

Author(s):

-Larry Letow, President, U.S. Region, CyberCX

Jim Mazotas, Founder, OnGuard Systems LLC

“All human beings have three lives: public, private, and secret.”  — Gabriel García Márquez, Gabriel García Márquez: a Life  “Experience should teach us to be most on our guard to protect liberty when the government’s purposes are beneficent. Men born to freedom are naturally alert to repel invasion of their liberty by evil-minded rulers. The … Read more

From the Winter 2015 Issue

Applying Analytical Tools to Cybersecurity

Author(s):

Joseph Lukowski, President, Laredo Technical Services, Inc.

There is a Method to the Madness of Criminal Intent  Late last summer, open source news reporting indicated that Chinese hackers may have been to blame for the breach of information at USIS, which is the major US contractor for security background investigations for the US Government. Initial estimates indicate that the hacking included more … Read more

From the Fall 2014 Issue

Hunting with Cyber Threat Intelligence

Author(s):

Robert S. Johnston, ,

Do the current techniques to conduct incident management and response constitute an effective counter threat operation?  In today’s threat landscape, chasing down alerts from your SEIM may not be enough to catch the most advanced threats.  Today’s Advanced Persistent Threats (APT) link sociological, psychological, and technical tradecraft together to infiltrate the  most secure networks, and … Read more

From the Fall 2014 Issue

Corporate America is Being Attacked and the Entry Vector May Be Surprising

Author(s):

Rick Mellendick, Chief Security Officer, Process Improvement Achievers, LLC

“Corporate America is under attack” has become a more regular headline with media outlets. Such reports often describe the attack and loss, but few explain why it happened and even fewer take the time to describe how not to let it happen. Even organizations focus on the attack, loss, and why the attack happened when … Read more

From the Fall 2014 Issue

America’s Biggest Threat: Economic Espionage and the Theft of Innovation

Author(s):

T. Casey Fleming, Chairman and CEO, BLACKOPS Partners Corporation

Experts Warn U.S. Companies Unwittingly in Full-On Economic War We live in a truly exciting time. Advances in technology permeate every aspect of our lives and enrich nearly everything we are involved in. Along with all the good technology brings us, there is also a dark side.  At the same time, the dark side also … Read more