From the Summer 2021 Issue

OSI: The Great Grandmother of Trouble Shooting

Author(s):

Nikkia S. Henderson, M.S., Secretary , Women in Cybersecurity Mid-Atlantic Affiliate

OSI

Imagine during class one evening, a professor asks a student, “Do you know what the OSI Model is?” At the thought of it being a trick question, the student, not answering immediately, slowly shook their head, and answered “no.” As an extra credit incentive, the professor tasked the student with preparing for a pop quiz … Read more

From the Summer 2021 Issue

Top 5 Tips for Small Business Resiliency

Author(s):

Kate Esprit, Intelligence Analyst , Sibylline Americas Inc.

Top Five Tips

What can we learn from a cyber-attack in Alaska? Albeit small, they were resilient! In July 2018, the small Alaskan community of Matanuska-Susitna (Mat-Su) was targeted by a ransomware attack, which resulted in more than 700 devices being knocked offline. The incident proliferated through Mat-Su’s local networks, impeding office phone lines and affecting the borough’s … Read more

From the Summer 2021 Issue

Cyber Nurse: How Healthcare Workers Can Prevent Another Type of Infection

Author(s):

Mason Moran, Senior SOC Analyst , Government Agency

Cyber Nurses- How Healthcare Workers Can Prevent Another Type of Infection

A DIFFERENT KIND OF INFECTION COVID-19 has doctors and nurses spread thin, they are working around the clock, and trying to keep their overly crowded hospitals functioning in some orderly fashion amidst the chaos. The last thing these workers need is another problem to worry about. Unfortunately, the pandemic brought upon an infection that healthcare … Read more

From the Summer 2021 Issue

How Do We Take the Sting Out of Being Stung?

Author(s):

-Larry Letow, Executive Vice President, Myriddian LLC , Operating Partner, Interprise Partners

Justin Petitt, Director of Cybersecurity, Systems Engineering Solutions Corporation

how-do-we-take-the-sting-out-of-being-stung

With cyber-attacks and ransomware making the mainstream news, and consequences rippling out far past single layers of users or customers, how can we collectively take the sting out of getting stung by a common cyber-heist?  Attacks against networks, data stores, and business processes are not new by any means. Indeed, without getting too deep into … Read more

From the Summer 2021 Issue

How to Decide a Safe and Suitable Business Model in a COVID-19 World for Your Business

Author(s):

Glenn Axelrod, M.Sc. IT, CISA, CISM, CRISC, Senior Information Technology Consultant , HKA Technology Solutions, L.L.C.

How to Decide a Safe and Suitable Business Model in a COVID-19 World for Your Business

Over the last ten years, remote work has increased by more than 100%; between 2017 and 2018, telecommuting increased by more than 20%. The COVID-19 pandemic altered our working environment, and some businesses discovered that they were unable to transition to a fully remote or hybrid workforce model. At the start of the COVID-19 pandemic, … Read more

From the Summer 2021 Issue

Addressing Malicious Websites Through Human Security Engineering

Author(s):

Ira Winkler, CISSP, CISO, Author, Skyline Technology Solutions

Addressing Malicious Websites Through Human Security Engineering

In the Spring 2021 issue of the United States Cybersecurity Magazine, “Human Security Engineering: A New Model for Addressing the “User Problem” I highlighted the strategy of Human Security Engineering to address the User Initiated Loss (UIL). To summarize briefly, UIL is the concept that a user does not actually create a loss, but may … Read more

From the Summer 2021 Issue

A (very) Brief Introduction to Open Source Intelligence (OSINT)

Author(s):

Nihad A. Hassan, Author , OSINT.link

A (very) Brief Introduction to Open Source Intelligence (OSINT)

Introduction Open Source Intelligence (OSINT) is a collective term used to describe all techniques and tools used to harvest information from publicly available resources in a timely manner to support a specific intelligence requirement. There was no particular date when the term OSINT was first coined; however, the act of gathering intelligence from publicly available … Read more

From the Summer 2021 Issue

The Subtle Sabotage of Blame in Cybersecurity and Online Safety

Author(s):

Tim McGuinness, Ph.D, Director , SCARS - Society of Citizens Against Relationship Scams Inc.

subtle-sabotage-of-blame

We All Do It, We All Blame Someone for Something Sometimes it is justified, sometimes there is cause, and it is very hard to remove it from your vocabulary – but it is always destructive. We recently heard a cybersecurity training professional tell a story about motivating a corporate team to do better with cybersecurity. … Read more

From the Summer 2021 Issue

Zero Trust: Is It All It’s Cracked Up To Be Or Is It Hype? Or A Bit of Both?

Author(s):

Tina Gravel, SVP Global Channels and Alliances , Appgate

Zero Trust

Few enterprise security technologies have garnered as much attention and hype as Zero Trust over the past decade. Yet, despite all the buzz, there remains a great deal of confusion and uncertainty in the market – is Zero Trust a framework, a reference architecture, or an actual technology? Does the Zero Trust model match the … Read more