United States Cybersecurity Magazine

ProcessBolt
From the Fall 2022 Issue

Who’s Responsible for the Death of Privacy?

Author(s):

A.J. Nash, Vice President of Intelligence, ZeroFOX

Application Security

It is a long established fact that a reader will be distracted by the readable content of a page when looking at its layout. The point of using Lorem Ipsum is that it has a more-or-less normal distribution of letters, as opposed to using ‘Content here, content here’, making it look like readable English. Many desktop publishing packages and web page editors now use Lorem Ipsum as their default model text, and a search for ‘lorem ipsum’ will uncover many web sites still in their infancy. Various versions have evolved over the years, sometimes by accident, sometimes on purpose (injected humour and the like).

From the Winter 2022 Issue

It’s Time for Intelligence Teams to Recommend Operational Changes

Author(s):

A.J. Nash, Vice President of Intelligence, ZeroFOX

AJ Nash winter 2022

Increased Focus on Configuration Management and Crown Jewels is Vital to Success Many experts​​ in cybersecurity talk about the need for “intelligence-driven security,” but most consumers don’t know what to do with the Intelligence they are paying for​ or how to measure the value of the actions taken as a result of that Intelligence. This may be somewhat expected for … Read more

From the Fall 2021 Issue

The Most Financially Devastating Form of Cyber-Attacks Can be Thwarted for Free

Author(s):

A.J. Nash, Vice President of Intelligence, ZeroFOX

As ransomware continues to grab most of the headlines in cybersecurity, it’s easy to lose track of the much larger threat of Business Email Compromise (BEC). According to the FBI’s 2020 Internet Crime Report, the Internet Crime Complaint Center (IC3) received 2,474 complaints of ransomware that resulted in $29.1M in financial loss.[1] While it is … Read more

Cyber Self-Defense Is Not Complicated

Author(s):

A.J. Nash, Vice President of Intelligence, ZeroFOX

Cyber Self-Defense

Whether it be texts that include personal content not meant for public consumption, emails, hard drives, cloud storage containing sensitive business information, or the endless supply of finance transaction data that most of us pass across the Internet daily, few people in the modern world are immune to the threat of a cyber-attack. Hence, the importance … Read more

From the Spring 2021 Issue

Rise of the Chief Intelligence Officer (CINO)

Author(s):

A.J. Nash, Vice President of Intelligence, ZeroFOX

rise-of-the-chief-intelligence-office-CINO

In response to growing threats in cyberspace, private sector organizations began creating Intelligence programs nearly a decade ago, usually referred to as Cyber Threat Intelligence (CTI). In theory, the private sector was attempting to replicate what the government has successfully done for generations: gain informational advantage to prevent enemy victories and mitigate damage from enemy … Read more

From the Spring 2017 Issue

The Differences Between Data, Information, and Intelligence

Author(s):

A.J. Nash, Vice President of Intelligence, ZeroFOX

Perhaps the most difficult part of the transition from public to private sector for cyber professionals coming out of the US intelligence community (IC) is one of language. Conversations regularly take place in industry settings where the first challenge is ensuring that everyone is speaking the same language. In the IC there are a few … Read more