United States Cybersecurity Magazine

ProcessBolt
From the Winter 2018 Issue

A (Very) Brief History of Pre-Computer Cryptography, Part 1

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

A brief History header image

This is the first part of a two-part article exploring the history of pre-computer cryptography.  Part 1 will focus on the period from the birth of cryptography some 4,000 years ago to the development of early transposition and substitution ciphers.  Part 2 looks at the emergence of cryptanalysis under the Abbasid Caliphate and goes through … Read more

From the Winter 2018 Issue

from the {Editor-in-Chief}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, It’s tempting to think of cybersecurity as an epic battle for control of global electronic resources, something waged between titans of technology, hidden armies of malicious actors and valiant defenders racing against the clock. That is the image portrayed on the big screen, and, not infrequently, at events like Black Hat, DEFCON and the … Read more

From the Fall 2017 Issue

Opting in to Cyber Vulnerablity Part 2: Technical Education in America

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

In the previous article in the United States Cybersecurity Magazine, Volume 5, Number 16 titled “Opting in to Cyber Vulnerability”, we examined the broad, “opt-in” nature of information insecurity in the United States. This article continues with an examination of the American educational enterprise with respect to preparing American students to safely and securely navigate … Read more

From the Fall 2017 Issue

Q&A Interview with Zane Lackey of Signal Sciences

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Signal Sciences develops a web protection platform that provides comprehensive threat protection and security visibility for web applications, microservices, and APIs on any platform. To answer some pertinent questions for our readers about emerging trends in security and DevOps, United States Cybersecurity Magazine conducted a Question & Answer interview with Zane Lackey, Signal Science’s co-founder … Read more

From the Fall 2017 Issue

from the {EDITOR-IN-CHIEF}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, On October 4th, 1957, the Soviet Union launched the world’s first man-made earth satellite, Sputnik 1. The American public was shocked by what appeared to be a triumph of Soviet engineering, and further dismayed by the televised, and spectacular, failure of the the American Vanguard Test Vehicle 3 launch vehicle two months later. Blame … Read more

From the Summer 2017 Issue

Opting in to Cyber Vulnerability

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Weak Nations, Asymmetric Warfare and Power Projection America’s rivals routinely employ offensive cyber operations to influence American actions and policy.  Despite claims made by pundits and the press, these are not powerful countries, and their reliance on cyber operations and asymmetric warfare betrays them as weak players on the international stage, unable to project power … Read more

From the Summer 2017 Issue

from the {EDITOR-IN-CHIEF}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

adam-firestone

Hello, If we were crying out for tangible evidence of the cost of cyber insecurity, we’d need to look no further than the headlines. (It’s always in the headlines!) On August 7th, attackers posted a video ransom note demanding $7.5 million in return for stolen HBO intellectual property. It seems that the good guys just … Read more

From the Spring 2017 Issue

It’s Not the Breach, It’s the Data: A Case for Deterrence by Denial

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

In his 1935 book, War is a Racket1, retired Marine Corps Major General (and two-time Medal of Honor recipient) Smedley Butler2 discussed the financial incentives and commercial benefits that lead nations to engage in armed conflict. Modern day motivations are no different. Verizon reported that, in 2016, “89% of breaches had a financial or espionage … Read more

From the Spring 2017 Issue

from the{EDITOR-IN-CHIEF} 

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, Boy, the hits just keep on coming, don’t they? No sooner has the dust settled on the last well-publicized breach, attack or vulnerability, than the next one pops up in the headlines. As the doxxing of the Democratic National Committee (DNC) by foreign hackers began to fade from the American collective consciousness, we were … Read more

From the Winter 2017 Issue

Information Integrity and National Identity

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

History defines who we are and informs how Americans chart the nation’s future. It underpins representative government. Increasingly, historical records and documents are being converted to digital formats. This promises to make essential information available to more Americans than before. There are also troubling implications. It takes only a cursory examination of recent events to … Read more