From the Fall 2022 Issue

The Growing Need for Continuous Monitoring of Your Digital Assets

Author(s):

Darren Craig, CEO, RiskXchange

continuous-monitoring-digital-assets

In today’s fast-paced economic landscape, organizations have little choice but to implement a growing number of digital solutions to keep up with the competition. Unfortunately, this technological innovation comes at a price as it leaves them increasingly vulnerable to a larger variety of cyber threats. As an organization’s IT infrastructure expands, so does its attack … Read more

From the Fall 2022 Issue

AppSec Should Focus on Providing Clarity for Engineers

Author(s):

Dustin Lehr, Director of Application Security, Fivetran

AppSec - Fivetran

The world of software development is relying more on real-time data every day, creating new opportunities for bad actors to infiltrate a network. The growth of online data is providing up-to-date intelligence and operational awareness, but also highlights the need for improved AppSec awareness across the United States.  It’s often a challenge to ensure software … Read more

From the Fall 2022 Issue

Are You Prepared to Meet the CMMC Guidelines? Advice on How to Ready Your Organization

Author(s):

Guy M. Bilyou, Cybersecurity Lead / ArCybr Lead Assessor, ArCybr

ArCybr-CMMC

CMMC. If you work as a U.S. defense contractor, chances are you have heard this term thrown around since 2019. While the COVID-19 pandemic, changes in DoD leadership, and content revisions delayed roll-out of the CMMC program, it will be back on track for implementation by late 2023.  But what is CMMC? Are you ready … Read more

From the Summer 2022 Issue

From the Editor-in-Chief

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, As long as I’m being honest, I might as well get this one off my chest:  Not only am I an unrepentant 80s metal-head, and one who’s convinced that music has only gone downhill since about 1988 (sorry, Rage Against the Machine fans), but of late, I’ve become convinced that much of what was … Read more

From the Summer 2022 Issue

From the Publisher

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Greetings, Welcome to the Summer 2022 issue of the United States Cybersecurity Magazine!   As always, we’d like to take a moment to thank our supporters, members, sponsors, contributors, and everyone else who makes the magazine possible.  All of us here at the United States Cybersecurity Magazine remain committed to bringing you, our readers, the … Read more

From the Summer 2022 Issue

Cyber Threat Intelligence Shapes the Future of SOC Operations

Author(s):

Dr. Paul de Souza, President, CSFI

CSFI Cyber Threat Intelligence

Cyber threat intelligence is critical for Security Operation Center (SOC) operators because it provides information about the Tactics, Techniques, and Procedures (TTPs) that attackers use to target their organization. This information can help SOC operators map out the adversary’s kill chain and identify potential Indicators Of Compromise (IOCs). Additionally, cyber threat intelligence can help SOC … Read more

From the Summer 2022 Issue

Zero Trust and Cryptanalytically Relevant Quantum Computers

Author(s):

Connie Uthoff, Program Director, The George Washington University

Over the past decade, due to the increase of sophisticated cyber threats and the success of malicious cyber threat actors, it has become increasingly clear that perimeter based cyber defenses have not been effective enough to protect public or private sector organizations.  The SolarWinds breach, the 2021 Microsoft Exchange Server compromise, the Capitol Pipeline and … Read more

From the Summer 2022 Issue

Three Security Challenges Federal Agencies Can Overcome with SASE, Zero Trust and SSE

Author(s):

Shamla Naidoo, Head of Cloud Strategy and Innovation, Netskope

Netskope Summer 2022 feature

New Federal Zero Trust Strategy Requires a New Approach to Create More Trust, Not Less One of the challenges to zero trust adoption that agencies have been wrangling with is the definition. Following Executive Order 14028 to improve the nation’s cybersecurity and protect federal government networks, the Office of Management and Budget (OMB) recently released … Read more

From the Summer 2022 Issue

Securing APIs Through External Attack Surface Management (EASM)

Author(s):

Phillip Wylie, Manager of Tech Evangelism & Enablement, CyCognito

Securing APIs-Phillip Wylie

As cybersecurity teams work tirelessly to secure their computing environments and stay ahead of risks, two areas that stand out are external attack surfaces and Application Programming Interfaces (APIs). These two areas are not new but have been overlooked or not adequately addressed. Attack surfaces, internal and external, have been around a long time. APIs … Read more

From the Summer 2022 Issue

Creating New Value Chains Through Disruptive Cyber Innovations

Author(s):

Kristi S. Halford, Founder, C3 Visionary Strategies

CSIOS Feature Summer 2022

Over the years, the Department of Defense (DOD) has continued to improve and optimize its capacity and capability to prevent and respond to an ever-increasing number of cyber threats and challenges. These include attributing cyber-attacks to their source; maneuvering in foreign cyberspace; relying on contracted commercial assets, including Internet service providers and global supply chains; … Read more