From the Fall 2024 Issue

Guide For Implementing Robust SAP Security

Author(s):

Christoph Nagy, CEO, SecurityBridge

Guide for Implementing Robust SAP Security

Cybersecurity has become one of the chief concerns for organizations worldwide. Enterprise systems, now ubiquitous in business, call for robust security measures. SAP, the preferred enterprise system, plays a significant role in business operations. With 99 of the 100 largest companies in the world being SAP customers, hackers have focussed on this enterprise platform juggernaut. … Read more

From the Fall 2024 Issue

Your Guide to SAP Security: Its Importance and Best Practices

Author(s):

Christoph Nagy, CEO, SecurityBridge

A Guide to SAP Security

In today’s digital age, cybersecurity has become a paramount concern for organizations across the globe. Among the various enterprise systems that require robust security measures, SAP (Systems, Applications, and Products in Data Processing) stands out due to its critical role in business operations, with 99 of the 100 largest companies in the world being SAP business applications … Read more

From the Fall 2024 Issue

Strategic Integration of Cybersecurity in Digital Transformation: Ensuring Resilience and Growth

Author(s):

Dr. Michael C. Redmond, PhD, Founder and CEO, Redmond Worldwide

Digital Tranformation

The Risk of Implementing Digital Transformation Without Cyber Security Considerations Is High In an era where digital transformation is pivotal for organizational growth and efficiency, neglecting cybersecurity can pose significant threats. As businesses increasingly integrate digital technologies into their operations, the potential for vulnerabilities multiplies. Without a robust cybersecurity framework, these vulnerabilities can be easily … Read more

From the Fall 2024 Issue
From the Spring 2022 Issue

Information Warfare and Government Policy: Creating a Holistic U.S. Cyber Posture Through Cyber Survivability

Author(s):

Jessica Trombley-Owens, Vice President, System & Mission Engineering, PLEX Solutions, LLC

The Next Pearl Harbor The former director of the CIA and once Defense Secretary, Leon Panetta, warned of the possibility of a “cyber-Pearl Harbor”. More specifically he referenced the use of both cyber and physical attacks on key military and critical infrastructure systems that would result in grave detriment to the U.S. and that the … Read more

From the Fall 2024 Issue
From the Spring 2022 Issue

Social Cybersecurity: Protecting the Cognitive Domain from Hacking

Author(s):

Richard Benack, Principal Investigator, Hiperformance Security

When we traditionally discuss the term “cybersecurity”, we think in terms of protecting computer systems and the data that resides in them. We rarely think of protecting the people who manage this technology and its associated data. Coming from the intelligence world, it was taught to assume that the weakest link in any system or … Read more

From the Fall 2024 Issue
From the Winter 2022 Issue

The Machine Industry and Control Systems: The National Security Risks with SCADA

Author(s):

Alan Cunningham, Independent Journalist, Truth Be Told

Alan-Cunningham

With any technological system, it can be susceptible to cyber-attacks or hacking measures by foreign or domestic actors for varying purposes. Within the United States, we have seen a large municipal city resort to pen and paper for daily tasks after a Ransomware attack, a breach of federal personnel information by hackers contracted by a … Read more

From the Summer 2024 Issue

The Human Factor: Users as Security Sensors

Author(s):

Phillip R. Hasse, President/CEO, Contextual IT Solutions

the Human Factor

If there is any consensus within IT security, it is that the security provided is often ineffective in preventing or detecting unauthorized activity. Attackers’ agility often exceeds the defenders’ ability to adapt to changing tactics and technologies. Typically, the response is to provide faster machines and more capable software. It’s like a high-stakes chess game … Read more

From the Summer 2024 Issue

Exploring the Differences Between Bug Hunters and Pentesters

Author(s):

Aditya Agrawal, Core Lead Pentester, Cobalt

Exploring The Differences Between Bug Hunters and Pentesters

In the following, we’ll talk about how to transition from a Bug Hunter to a Pentester. It’s important to note that this content is intended to be an objective comparison with a real person’s experiences. These professions have individual pros/cons that add value to the security industry as a whole.  It’s not uncommon to meet … Read more

From the Summer 2024 Issue

DevSecOps 2026: Working Beyond the Organization

Author(s):

Devin Price, Senior Application Security Analyst , NowSecure

By 2026, what will the landscape of DevSecOps look like? How can organizations prepare for this future in the present? Before we can speculate on the future of DevSecOps, we must first consider how it came to be. Before DevSecOps, there was simply DevOps. The goal of DevOps was to allow the development and operations teams within an organization to work together as one cohesive unit, instead of two separate entities. The combination of these teams resulted in a decrease of time for both continuous integration and deployment (Rajapakse, Zahedi, Babar, & Shen, 2021). From the . . .