United States Cybersecurity Magazine

ProcessBolt
From the Spring 2022 Issue

Shifting Our Thinking from Cybersecurity to Cyber Safety

Author(s):

Stephen Cardot, CEO, President, Founder, CloudCover

Our reactive, defensive approach to IT security isn’t working − proactive de-risking is the way forward. “Disconcertingly routine.” That’s how an article in a national news publication summed up the current cyber-attack landscape after the recent discovery that Chinese hackers had breached several governments and universities around the world in a years-long campaign to steal … Read more

From the Spring 2016 Issue

New Possibilities for Solving CYBERCRIME

Author(s):

-William J. "Bill" Britton, Vice President of Information Technology and Chief Information Officer, California Polytechnic State University

Combatting cybercrime is where we, as a society, find ourselves in uncharted territory.   The criminal of today does not rely on in-person interaction, but on the continually-shifting dynamics of the Internet. It is arguable that every crime involves some sort of cyber component, whether as its culminating element or an intermediary step. In either circumstance, … Read more

From the Spring 2016 Issue

Digital and Physical Security Converged: How to Achieve the Next Generation of Cyber Defense

Author(s):

Christopher Ensey, Chief Operating Officer, Dunbar Security Solutions

With more than 80 million related events occurring annually, cybersecurity is one of the biggest concerns for companies today.1 And since 55 percent of attacks in 2014 were carried out by insiders – actors with either physical or remote internal access to an organization’s systems – it is clear that cyber-attacks do not occur in … Read more

From the Spring 2016 Issue

Cyber-Physical Security for 3D Printing

Author(s):

Sharon Flank, Ph.D., CEO, InfraTrac, Inc.

Counterfeiting threatens profits, compromises brand reputation, and endangers customers. A fake bag or watch may seem like a harmless bargain, but buyers are often unaware that its profits fund organized crime or even terrorism. The dangers of counterfeit medical devices, airplane parts, and truck brakes are another matter entirely. The U.S. economy relies on intellectual … Read more

From the Spring 2016 Issue

Technology and the Tension between Security and Privacy

Author(s):

Connie Uthoff, Program Director, The George Washington University

At the Electronic Privacy Information Center (EPIC) Champions of Freedom event in June 2015, Apple CEO Tim Cook stated, “Like many of you, we at Apple reject the idea that our customers should have to make tradeoffs between privacy and security. We can and we must provide both in equal measure. We believe that people … Read more

From the Winter 2015 Issue

Next Generation Espionage

Author(s):

Daren Dunkel, Chief of Staff, McAfee

As we enter the new year we approach the one year anniversary of the Target corporation hack. Their CEO is out of a job, their board of directors is being sued, and the brand has suffered, by some estimates, $1 billion in damages. Unfortunately the Target Corporation is not an isolated example. Recently the headlines, … Read more