United States Cybersecurity Magazine

ProcessBolt
From the Summer 2021 Issue

Flashing Red Lights: Cybersecurity for Intelligent Transportation Systems

Author(s):

Christopher J. Brown, Author ,

Henry J. Sienkiewicz, Author,

Red lights, yellow lights, green lights. A flashing light?  A traffic warning sign?  Recognized as a critical infrastructure by the Department of Homeland Security (DHS), the transportation system is essential to modern life. From the skies to the seas to the railways to the roadways, and to bike lanes and pedestrian crossing, this highly complex … Read more

From the Winter 2021 Issue

Five Approaches and Tools For Organizations to Mitigate Their IoT/ICS Cyber Risks

Author(s):

Henry J. Sienkiewicz, Author,

Sam Kendrick, Student – Technology Management Program, Georgetown University (Co-author)

5 Approaches

Infrastructure is everything you don’t think about.  The roads you drive on. The rigs and refineries that turn fossil fuel into the gas that makes your car go. The electricity that power the streetlights and lamps that guide your way. All these technologies that vanish into the oblivians of normalcy.”  Ian Bogost, The Atlantic[1] From … Read more

From the Winter 2019 Issue

Evaluating the Operational Technology Environment: Improving DHSs Cybersecurity Evaluation Tool (CSET)

Author(s):

Henry J. Sienkiewicz, Author,

HenrySienkiewicz-feature-image-wn19

Servers, laptops, mobile devices, routers, industrial control systems, fire control systems, elevator operations, are the connected technology components of modern life that perform particular functions, offer ease of use, and that represent risks and vulnerabilities to an organization’s cyber environment. The cyber environment is tied to physical devices, including networking equipment, intrusion detection systems, data … Read more

From the Summer 2018 Issue

Tell it to the Marines: Leadership Principles and Network Security

Author(s):

Henry J. Sienkiewicz, Author,

Tom Costello, Network & Systems Technician, XR Trading LLC

BAMCIS

It’s after-hours on a Friday. You are talking a remote employee through installing a next-generation firewall. No traffic is passing through the network and now you’re stuck on the project until it’s fixed. Weekend off-hours maintenance windows in the name of improving cybersecurity posture can be some of the most high-stress, high-risk, low-morale projects undertaken … Read more

From the Spring 2018 Issue

Cybersecurity Impacts of the EU GDPR

Author(s):

Henry J. Sienkiewicz, Author,

GDPR FEATURE IMAGE

Cybersecurity Considerations Around General Data Protection Regulation (GDPR) Data breaches and cyber-attacks have become commonplace. Every organization, regardless of the type of business or size, is a target. Safeguarding data (and it is data that is the ultimate target) is the challenge, a challenge that spans technical, military, political, and law enforcement concerns within a … Read more

From the Winter 2018 Issue

Closing the Gap: Supply Chain Risk Management

Author(s):

Christopher Jones, Senior IT Project Manager , CACI

Henry J. Sienkiewicz, Author,

Closing the Gap image

The growing sophistication of Information Technology (IT) and the proliferation of Internet of Things (IoT) devices continue to exacerbate vulnerabilities leading to cybersecurity risks. With the supply chain globalization and continued reliance on outsourcing, organizations depend heavily on diverse networks of partners and suppliers. Whether manufacturing sensors for industrial control systems (ICS) or developing software code, … Read more

From the Fall 2017 Issue

Legacy Modernization as a Cybersecurity Enabler

Author(s):

Henry J. Sienkiewicz, Author,

Dependencies on information technology began logically enough. In a technology-driven and dependent marketplace, enterprises seek to leverage information technology to improve their market position. Industries adopted COBOL-based software and mainframe computers for statistical reporting, accounting, claims, policy administration, billing and various information-processing activities.1 Many mainframe and legacy applications are older and require significant upgrades in … Read more

From the Summer 2017 Issue

SOFTWARE DEFINED NETWORKING’S (SDN) IMPACT ON CYBERSECURITY

Author(s):

Henry J. Sienkiewicz, Author,

Our connected world has changed expectations and requirements. Only a short time ago, a mobile phone connected to an enterprise application would have been unimaginable. The network could not support it. Security would not allow it. Both have evolved. The network has dramatically increased in bandwidth while becoming much more agile. Static, fixed IP addresses … Read more

From the Spring 2017 Issue

INDEPENDENCE & OBJECTIVITY: Fundamental Best Practices for Cybersecurity Assessments

Author(s):

Henry J. Sienkiewicz, Author,

Cyber professionals generally know one thing – the cyber environment is constantly shifting. New business requirements, end-user needs and technologies change. New devices and applications create or remove vulnerabilities on a daily basis. Attackers respond and adapt as they seek to find exploitable weaknesses within the environment in order to reach an organization’s data. As … Read more