From the Summer 2023 Issue

Capturing The Sun: Solar and Cybersecurity

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

Thelonious K. Walker II, Alumnus, 2023, Georgetown University

Capturing the Sun

Burning mirrors. Since the seventh century BCE, man has tried to harness the power of the sun. Burning mirrors, magnifying glasses, were used to concentrate the sun’s rays.[1] These burning mirrors were positioned to focus sunlight onto a specific target. The concentrated heat was initially used to light fires; they eventually generated steam, heated fluids, … Read more

From the Summer 2023 Issue

Making Sense of CNAPP

Author(s):

Alex Haynes, CISO , IBS Software

Making Sense of CNAPP

Cloud Native Application Protection Platforms (CNAPP) are a new category of security tools that are designed to protect cloud-native applications. CNAPPs are a combination of functionality that comprise Cloud Security Posture Management (CSPM), Cloud Workload Protection Platform (CWPP), and Cloud Infrastructure Entitlement Management (CIEM). More recently they’ve integrated SAST (Static Application Security Testing) for workloads … Read more

From the Summer 2023 Issue

Next-Gen Devices Require Next-Gen R&D

Author(s):

Anthony Ricco, Chief Marketing Officer, Corellium

When we hear the term “IoT”, we immediately think of innovation, cutting edge, or a new way of doing things. We think about home automation, computer vision, smart watches, and driverless cars. When you stop to consider the endless ways IoT has modernized daily life and business, it’s pretty astounding. So why then is the … Read more

From the Summer 2023 Issue

Navigating the Environment of Zero Trust Architecture: How to Avoid Confusion and Begin Preparations

Author(s):

Lauren Beward, Senior Cybersecurity Specialist, ArCybr

For those who work in Department of Defense (DoD) and Government contracting, the term “Zero Trust Architecture” (ZTA) can be found everywhere, an oft-quoted buzzword that outlines the future of cybersecurity for our Nation’s networks and systems. So, what is ZTA really, and how will it affect security standards and processes in the future? This … Read more

From the Spring 2023 Issue

From the Editor-in-Chief

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, Imagine a world where a single factory produced 55% of the planet’s food supply and almost all of the nutritious foods that are required for children to develop into, and remain, vigorous, healthy, and productive adults with strong immune systems and sharp minds.  Putting this into perspective, the countries that represent the Organization of … Read more

From the Spring 2023 Issue

From the Publisher

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Greetings, Welcome to the Spring 2023 issue of the United States Cybersecurity Magazine!  As always, we’d like to take a moment to thank our supporters, members, sponsors, contributors, and everyone else who makes the magazine possible.  All of us here at the United States Cybersecurity Magazine remain committed to bringing you, our readers, the best … Read more

From the Spring 2023 Issue

New-Hybrid Warfare (Part One)

Author(s):

Brett R. O’Bannon, PhD, Independent Consultant,

New Hybrid Warfare

The fundamental nature of international conflict is undergoing a profound transformation. The concept of hybrid warfare sought to capture this change by challenging the way we think about, and plan for, a rapidly mutating threat landscape.[1] Though innovative in many respects, the hybrid warfare paradigm has still only somewhat tangentially incorporated cyber warfare into models … Read more

From the Spring 2023 Issue

The Double-Edged Sword of Cyber Threats in Latin America

Author(s):

Kate Esprit, Cyber Threat Intelligence Analyst, MITRE

Cyber Threats in Latin America

Ask any cyber intelligence analyst about today’s major threats, and they will likely launch into a discussion about hacking groups in China, Iran, North Korea, or Russia. Indeed, state-sponsored threat actors in these countries are highly sophisticated and have wreaked havoc on global network infrastructure. However, the cybersecurity industry continues to overlook other areas of … Read more

From the Spring 2023 Issue

Robots and Cybersecurity

Author(s):

Connie Uthoff, Program Director, The George Washington University

Robots and Cybersecurity

The global market for industrial robots has been increasing steadily since 2020 and is expected to reach 104.65 billion dollars in 2023 (Statista, n.d.). Though concepts related to robotics and automated tools have their roots far back in history (Robotnik, n.d.), today, robots are being deployed around the world across a wide range of industries.  … Read more

From the Spring 2023 Issue

How It Started and How It’s Going: CMMC Rule-Making Processes in Flux

Author(s):

Guy M. Bilyou, Cybersecurity Lead / ArCybr Lead Assessor, ArCybr

CMMC Rule Making Proccess

“Fits and starts” is the cliche that comes to mind when considering the rocky roll out of the National Institute of Standards and Technology’s (NIST’s) Cybersecurity Maturity Model Certification (CMMC). Throughout the development of CMMC, numerous aspects have changed – the definitions, characteristics, and controls; the way organizations will be assessed; and even the requirements … Read more