From the Spring 2024 Issue

Digital Twins: Mirroring Business, Mirroring Cybersecurity Risks

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

Digital Twins

A digital twin is a virtual representation of a physical object, process, or system. Digital twins have emerged as a critical technology that fundamentally changes how companies design, monitor, and maintain their physical assets in today’s rapidly evolving industrial landscape. A digital twin is a virtual representation of a physical object, process, or system. Often … Read more

From the Spring 2024 Issue

The Case for Moving Beyond VPNs: Embracing Conditional Access

Author(s):

Alex Haynes, CISO , IBS Software

The Case for Moving Beyond VPNs: Embracing Conditional Access

In the ever-evolving landscape of cybersecurity, traditional tools, and approaches to securing remote access, such as Virtual Private Networks (VPNs), are increasingly seen as inadequate for the complex demands of modern enterprise environments. The shift towards a more dynamic, distributed workforce, along with the proliferation of cloud services and mobile computing, necessitates a re-evaluation of … Read more

From the Spring 2024 Issue

The Evolution of DoD‘s Cybersecurity Service Provider Program Evaluator Scoring Metrics

Author(s):

Roston Fyle, Cyber Strategist, CSIOS Corporation

Tyson Gee, Chief Compliance Officer, CSIOS Corporation

Introduction In the fast–paced world of cybersecurity, staying ahead of emerging cyber threats is not simply a necessity but an essential, constant challenge. Since its inception, the Department of Defense (DOD) Cybersecurity Service Provider (CSSP) Program has been at the forefront of the Department’s cyberwarfare battleground. Over the years, the Program has morphed significantly and … Read more

From the Winter 2024 Issue

From the Editor-in-Chief

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, Over the last several decades the terms information security and cybersecurity have become conflated to the extent that they’re used interchangeably.  Information security is cybersecurity is information security.  For sources that do identify a difference between the two, it’s often two sides of the same coin: Information security speaks to the attributes of security … Read more

From the Winter 2024 Issue

From the Publisher

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Greetings! It is with immense pleasure that I announce the release of the Winter 2024 issue of the United States Cybersecurity Magazine.  As we move forward in the new year, we are thrilled to bring you the latest insights, trends, and developments in the ever-evolving field of cybersecurity. I would personally like to thank our … Read more

From the Winter 2024 Issue

Exploring the Dark Web: Understanding its Role in Cybersecurity Threats

Author(s):

Justin Petitt, Director, Cybersecurity Center of Excellence, Edgewater Federal Solutions

Exploring the Dark Web

What in the Dark Web is happening here? “What in the Dark Web is happening here?” was the first thing said to me over a recent holiday trip, with a friend walking in and seeing me checking in on work and life with three separate laptops set up in front of me, my attention and … Read more

From the Winter 2024 Issue

Flashing Red Lights: Cybersecurity for Intelligent Transportation Systems

Author(s):

Christopher J. Brown, Author ,

Henry J. Sienkiewicz, Faculty, Georgetown University

Red lights, yellow lights, green lights. A flashing light?  A traffic warning sign?  Recognized as a critical infrastructure by the Department of Homeland Security (DHS), the transportation system is essential to modern life. From the skies to the seas to the railways to the roadways, and to bike lanes and pedestrian crossing, this highly complex … Read more

From the Winter 2024 Issue

UNISQUATTING IDN HOMOGRAPH ATTACKS

Author(s):

Danny Gershman, Founder and CEO, Radius Method

Unisquatting (a portmanteau for Unicode cybersquatting) or the Internationalized Domain Name (IDN) homograph attack is a fairly new type of mechanism that builds on several other types of Domain Name System (DNS) address attacks. The typosquat (Uniform Resource Locator (URL) hijacking) attack relies on being able to register a domain name very closely resembling another … Read more

From the Winter 2024 Issue

Navigating Blockchain and Quantum Computing and Their Cybersecurity Impacts

Author(s):

Gaurav Sharma, Director of Operations, Chetu

In a dynamic industry where technological evolution is constant, staying informed about the latest advancements is crucial for businesses aiming to optimize operations and bolster cybersecurity. Embracing new technologies not only enhances functionality but also ensures the seamless integration of innovative systems. As businesses increasingly rely on secure transactions and data protection, the popularity of … Read more