From the Fall 2015 Issue

Moving Past Passwords: PIV Credentials for Mobile Device Users

Author(s):

William (Curt) Barker, Cybersecurity Standards and Technology Advisor, National Cybersecurity Center of Excellence

How many accounts do you have that require a username and password? And how many of those usernames and passwords are the same? Chances are that the answer is quite a few. The drive to create more secure passwords, requiring case-sensitive letters, numbers, symbols, and high minimum character counts, often drives people to reuse passwords … Read more

From the Fall 2015 Issue

HOW GOVERNMENTS CAN TURN BYOD FROM A CHALLENGE INTO AN OPPORTUNITY

Author(s):

Joseph Petroski, Senior Director of Sales Engineering, CellTrust Corporation

Bring your own device (BYOD) is not new to government organizations. For years, employees have used their own computers and laptops for work. What has changed is the dramatic rise in mobile device use for both personal and professional interactions. As a result, state and federal government agencies are looking at new ways to support … Read more

From the Fall 2015 Issue

California Gold: Cybersecurity’s Emerging Epicenter

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

A Truth Universally Acknowledged  That cybersecurity is a necessity for individuals, organizations, and governments across all nations and walks of life is easy enough to agree upon. “Cybersecurity has no boundaries,” explained Alberto Yepez, a Managing Director at Trident Capital and member of the California Cybersecurity Task Force’s Economic Development Subcommittee. “It’s a global problem. … Read more

From the Fall 2015 Issue

Veterans: The Short Answer to the Cybersecurity Shortage

Author(s):

Kathleen Smith, Chief Marketing Officer, ClearedJobs.net

We hear frequently that there is a cybersecurity workforce shortage. While there are many great programs in progress to enhance the technical skills of our future workforce, they are still not enough to meet the current need in the United States. Meanwhile, despite the fact that we have the most trained and skilled military workforce … Read more

From the Fall 2015 Issue

Securing Social: ZeroFOX’s Approach to Cybersecurity in the Facebook Age

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

What’s the most populous country in the world? China, with 1.36 billion people? India, with 1.25 billion? If you answered either of those countries, you’re wrong. The most populous country boasts 1.49 billion people, has only been around since 2004, and you yourself are probably a citizen.1 Guessed it yet? It’s Facebook. According to the … Read more

From the Fall 2015 Issue

Building the Cyberforce of the Future

Author(s):

Christen Marie Smith, Program Manager, LMI

The Force of the Future  The eyes of the Department of Defense are on the future— specifically, the force of the future. This spring, Secretary of Defense Ash Carter announced a far-reaching initiative to update the ways in which we attract, recruit, develop, utilize, support, and retain skilled personnel to bolster the national security mission.1 … Read more

From the Fall 2015 Issue

The Role of Social Networks in Securing Cyberspace: Opportunities and Threats

Author(s):

J. L. Billingsley, Advisory Board Member, Cyber Security Forum Initiative

Many in American society today equate social networks with online communities such as Google+ and LinkedIn. However, social networks have existed since the dawn of man. While the prominence of social networks continues to grow and has proven to be a rich research area, we already know a lot about their characteristics. For those of … Read more

From the Fall 2015 Issue

Staying a Move Ahead in Cyber-Chess

Author(s):

Dr. Alenka Brown, President , McClure, Brown & Associates LLC

Dr. Joe McClure VanHoozer, Founder, McClure, Brown & Associates LLC

Mr. Jason Christman, MS, CISSP, PMP, Subject Matter Expert, McClure, Brown, & Associates® LLC

Neurocognitive Patterns in Cyberspace  Humans process somatosensory information – defined by Kandel, et al as “different forms of energy…transformed by the nervous system into different sensations or sensory modalities: vision, hearing, touch/emotion, taste, and smell”1 – at several levels simultaneously. This information, composed of neuro psychometric indicators (NPI) – the verbal and non-verbal cues of … Read more

From the Fall 2015 Issue

Social Engineering: The Root of the Cyber Threat

Author(s):

Douglas Rausch, President, Aurora CyberSecurity Consultants, Inc.

R. “Montana” Williams, Founder and Managing Partner , Titan Rain Cybersecurity, LLC

When conducting reconnaissance of your cyber infrastructure, attackers look for weaknesses they can utilize to successfully penetrate your infrastructure with the least expenditure of resources and risk of being detected. The vulnerabilities created by human action or inaction have always been a potential attack vector. The increased focus on adding technical controls to bolster cyber … Read more

From the Fall 2015 Issue

Navigating the Cybersecurity Workforce Development Landscape

Author(s):

Michael Volk, Cybersecurity Specialist, PSA Insurance & Financial Services

The increasing need for advancements in cybersecurity creates new business opportunities, impacts the way mature organizations operate, and changes the way individuals conduct their personal and professional lives. These conditions create tremendous opportunities for organizations and jobseekers alike. However, due to the nature of the cybersecurity workforce landscape, jobseekers often have a difficult time understanding … Read more