From the Summer 2022 Issue

From the Editor-in-Chief

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, As long as I’m being honest, I might as well get this one off my chest:  Not only am I an unrepentant 80s metal-head, and one who’s convinced that music has only gone downhill since about 1988 (sorry, Rage Against the Machine fans), but of late, I’ve become convinced that much of what was … Read more

From the Summer 2022 Issue

From the Publisher

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Greetings, Welcome to the Summer 2022 issue of the United States Cybersecurity Magazine!   As always, we’d like to take a moment to thank our supporters, members, sponsors, contributors, and everyone else who makes the magazine possible.  All of us here at the United States Cybersecurity Magazine remain committed to bringing you, our readers, the … Read more

From the Summer 2022 Issue

Cyber Threat Intelligence Shapes the Future of SOC Operations

Author(s):

Dr. Paul de Souza, President, CSFI

CSFI Cyber Threat Intelligence

Cyber threat intelligence is critical for Security Operation Center (SOC) operators because it provides information about the Tactics, Techniques, and Procedures (TTPs) that attackers use to target their organization. This information can help SOC operators map out the adversary’s kill chain and identify potential Indicators Of Compromise (IOCs). Additionally, cyber threat intelligence can help SOC … Read more

From the Summer 2022 Issue

Zero Trust and Cryptanalytically Relevant Quantum Computers

Author(s):

Connie Uthoff, Program Director, The George Washington University

Over the past decade, due to the increase of sophisticated cyber threats and the success of malicious cyber threat actors, it has become increasingly clear that perimeter based cyber defenses have not been effective enough to protect public or private sector organizations.  The SolarWinds breach, the 2021 Microsoft Exchange Server compromise, the Capitol Pipeline and … Read more

From the Summer 2022 Issue

Three Security Challenges Federal Agencies Can Overcome with SASE, Zero Trust and SSE

Author(s):

Shamla Naidoo, Head of Cloud Strategy and Innovation, Netskope

Netskope Summer 2022 feature

New Federal Zero Trust Strategy Requires a New Approach to Create More Trust, Not Less One of the challenges to zero trust adoption that agencies have been wrangling with is the definition. Following Executive Order 14028 to improve the nation’s cybersecurity and protect federal government networks, the Office of Management and Budget (OMB) recently released … Read more

From the Summer 2022 Issue

Securing APIs Through External Attack Surface Management (EASM)

Author(s):

Phillip Wylie, Manager of Tech Evangelism & Enablement, CyCognito

Securing APIs-Phillip Wylie

As cybersecurity teams work tirelessly to secure their computing environments and stay ahead of risks, two areas that stand out are external attack surfaces and Application Programming Interfaces (APIs). These two areas are not new but have been overlooked or not adequately addressed. Attack surfaces, internal and external, have been around a long time. APIs … Read more

From the Summer 2022 Issue

Creating New Value Chains Through Disruptive Cyber Innovations

Author(s):

Kristi S. Halford, Founder, C3 Visionary Strategies

CSIOS Feature Summer 2022

Over the years, the Department of Defense (DOD) has continued to improve and optimize its capacity and capability to prevent and respond to an ever-increasing number of cyber threats and challenges. These include attributing cyber-attacks to their source; maneuvering in foreign cyberspace; relying on contracted commercial assets, including Internet service providers and global supply chains; … Read more

From the Spring 2022 Issue

From the Publisher

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Greetings, Welcome to the Spring 2022 issue of the United States Cybersecurity Magazine!   As always, we’d like to take a moment to thank our supporters, members, sponsors, contributors and everyone else who makes the magazine possible.  All of us here at the United States Cybersecurity Magazine remain committed to bringing you, our readers, the … Read more

From the Spring 2022 Issue

From the Editor-in-Chief

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, Let’s be honest.  All of us in the cybersecurity community think of ourselves, more or less (and more often more than less) as technocrats.  We’re masters of that sterile domain in the ether where everything boils down to sterile ones and zeros (or qubits).  We speak in tongues, our conversations a tent-revival glossolalia made … Read more

From the Spring 2022 Issue

Making Better Cyber Risk Decisions By Architecting the Choices

Author(s):

Malcolm Harkins, Chief Security and Trust Officer, Epiphany Systems

“Victory awaits him who has everything in order. Defeat is certain for him who has neglected to take all the necessary precautions in time.” Roald Amundsen, on the South Pole. Uncertainty, chaos, and luck – why some thrive despite them all.  In the book Great by Choice, Jim Collins and Morten Hansen distill a decade’s … Read more