United States Cybersecurity Magazine

ProcessBolt
From the Winter 2015 Issue

Designing A Cybersecurity Solution: Security Reference Architectures

Author(s):

Dr. Eric Yocam, CRISC, CISSP, Adjunct Professor, University of Fairfax

Security reference architectures come in many flavors including industry-based, technology-based and enterprise-specific. When looking for some directional guidance when designing a cybersecurity solution, a cybersecurity professional can leverage the security reference architecture. The cybersecurity solution design may take the form of prevention and/or remediation of a particular prioritized risk found within the risk register. For … Read more

From the Summer 2014 Issue

Finding Clarity in Blurred Boundaries: From Activism to Cyberterrorism

Author(s):

Dr. Eric Yocam, CRISC, CISSP, Adjunct Professor, University of Fairfax

A meaningful boundary (or distinction) can be drawn among sometimes blurred descriptive terms including activism, hacktivism, cybervandalism and cyberterrorism.1 Are Hackers Really Ethical?  The term hacker’s ethic describes the moral values and philosophy that are standard in the hacker community. The hacker’s ethic also represents a form of unrestricted access, freedom of information, and improvement … Read more

From the Spring 2014 Issue

Focusing a Leader’s Lens on Cybersecurity Within a Vast Framework Landscape

Author(s):

Dr. Eric Yocam, CRISC, CISSP, Adjunct Professor, University of Fairfax

Cyber Threats Abound  When dealing with Cybersecurity, a leader must be vigilant and at a moment’s notice be able to evaluate his or her organization’s security posture in regards to cyber threats. Cyber threats are typically viewed from GRC perspectives including governance, risk and compliance but equally important perspectives include policy, value, service, program, and … Read more