From the Summer 2015 Issue

A-ISAC Cooperating to Protect Our Skies

Author(s):

Faye Francy, Executive Director, Aviation Information Sharing and Analysis Center

The aviation sector plays such a critical role in the world economy that it has become an attractive target for a variety of malign actor groups. Each year, the air transportation system carries over 2.6 billion passengers and 48 million tons of freight, making it the world’s greatest source of international trade, tourism, and economic … Read more

From the Summer 2015 Issue

The Need for Increased Cyber Threat Intelligence in the Electricity Sector

Author(s):

Brian Harrell, CPP, Director, Energy Security, Navigant

The electricity sector is in the midst of a fundamental cultural change with respect to cybersecurity. While the electricity sector has been the only critical infrastructure sector that has had mandatory and enforceable cybersecurity standards to date, this minimum level of protection is not enough to battle the continuous onslaught of malicious code and targeted … Read more

From the Summer 2015 Issue

The Next Big Data Breach: Don’t Let It Be You!

Author(s):

Kris Martel, EVP of Operations, Chief Information Security Officer, Emagine IT

Protection of information and data has always been one of the top priorities for organizations, governments, and businesses. For example, small restaurants have their “secret recipes” that set them apart from their competition. Larger organizations like Coca-Cola guard their product formulae and protect them like the Crown Jewels of England. On the government side, the … Read more

From the Summer 2015 Issue

Exploring Behavioral and Neuroscience Approaches to Cybersecurity: A Study of Phishing

Author(s):

Eric Reeves, Senior Manager, Lockheed Martin

The behavioral factors that contribute to users falling victim to phishing attacks include a lack of understanding of how computer systems work, lack of attention, and phishers’ increasingly sophisticated methods of visual deception.  Attacks on our computer systems continue to increase in frequency and sophistication. Organizations invest significant resources in the development of cyber protection … Read more

From the Summer 2015 Issue

from the{PUBLISHER}

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Karen Austin

Greetings,    Welcome to the Summer 2015 issue of the United States Cybersecurity Magazine! Now more than ever, threats from a wide variety of malicious entities with a vast range of motivations stream across the oceans, penetrating the defenses of every level of business and government. A widespread lack of awareness of the threats we … Read more

From the Spring 2015 Issue

Cyber Innovation Center: a Pioneer in Cyber-Education and Workforce Development

Author(s):

G.B. Cazes, Vice President, Cyber Innovation Center

What do you want to be when you grow up? This is a timeless question teachers across the country ask their students. A typical response: doctor, nurse, lawyer, fireman, veterinarian. While these are great occupations, today’s workforce not only includes these professions but also great opportunities for computer and data scientists, cybersecurity directors, digital forensics … Read more

From the Spring 2015 Issue

Creating Your Ultimate Code-Cracker: the Design of Digital Forensic Workstations

Author(s):

John Samborski, CEO, Ace ComputersUnited

Today most records of individuals, businesses, government agencies, and even criminal organizations are stored on various types of electronic media. In order to properly investigate a suspect, evidence needs to be extractable from electronically stored information (ESI) sources without being corrupted. Digital forensics is the acquisition, scientific examination, and analysis of data retrieved from digital … Read more

From the Spring 2015 Issue

Keep It Secret, Keep It Safe: Nine Steps to Maintaining Data Security

Author(s):

Alvita Fitzgerald, Vice President of Administration, Megadata Technology

Jessica Schneider, Strategic Communications Specialist, Megadata Technology

Megadata Technology is a cybersecurity company located in National Harbor, Maryland, just across the river from Washington, DC. As a company whose focus is on securing information for national organizations, it is important for our clients and our staff to always be aware of potential security breaches and ways to avoid them. Our years of … Read more

From the Spring 2015 Issue

Small Business Big Threats: Cybersecurity in Small Enterprise EnvironmentsUnited

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

Megan Clark, Help Desk Technician, Bryn Mawr College

Cybersecurity may not seem like a priority for many small enterprise environments – after all, you’re small. Who would want to hack, phish, or spam you? But small enterprise environments face just as much, if not more, threat as large corporations. You need only look at recent news to see why small businesses may be … Read more