From the Fall 2014 Issue

Strengthening the Brain of the Cyberwarrior: Using Neuroscience to Improve Education

Author(s):

Eric Reeves, Senior Manager, Lockheed Martin

The domain of cybersecurity has experienced exponential growth within the past several years, and with this growth has come the need for programs to educate and train the personnel employed in the field. A recent search on the internet for “cybersecurity training” returned 25,100,000 results, with options extending across degree and certificate programs at universities … Read more

From the Fall 2014 Issue

America’s Biggest Threat: Economic Espionage and the Theft of Innovation

Author(s):

T. Casey Fleming, Chairman and CEO, BLACKOPS Partners Corporation

Experts Warn U.S. Companies Unwittingly in Full-On Economic War We live in a truly exciting time. Advances in technology permeate every aspect of our lives and enrich nearly everything we are involved in. Along with all the good technology brings us, there is also a dark side.  At the same time, the dark side also … Read more

From the Fall 2014 Issue

Taking the Lead on a Regional Approach to Solving Cybersecurity Workforce Challenges

Author(s):

LeVorn Smalley, Industry Navigator, Cybersecurity & IT, Anne Arundel Workforce Development Corporation

Maryland is a cybersecurity hot spot, with the main cybersecurity industry region radiating from government and defense missions surrounding Ft. Meade in Anne Arundel County. Aberdeen Proving Ground and Patuxent River Naval Air Systems Command have also seen rapid growth in government cybersecurity activity in addition to commercial cybersecurity sector growth in Prince George’s, Baltimore, … Read more

From the Fall 2014 Issue

Chinese Hackers and Their New Target- Federal Employees

Author(s):

Ellen Cornelius, J.D., J.D., The Center for Health & Homeland Security

Currently, the U.S.  government monitors approximately 20 Chinese hacking groups; however, no system is flawless. Federal agencies reported that in fiscal year 2013, 9,883 malware attacks were launched.1 The number of intrusions was not released. In March 2014, Chinese hackers allegedly infiltrated the networks of the Office of Personnel Management (OPM), the Government Accountability Office … Read more

From the Fall 2014 Issue

Why Your Business Should Use Two-Factor Authentication

Author(s):

Greg Gunther, Software Engineer, Visionist, Inc.

A 2011 study by University of Cambridge computer security researcher Joseph Bonneau uncovered a shocking reality. Bonneau compared two password databases leaked from popular websites (Gawker and rootkit.com.) He discovered that over 31% of users who had an account on both sites reused the same password1. Equally troubling is the recent news that a Russian … Read more

From the Fall 2014 Issue

from the{PUBLISHER}

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Karen Austin

Greetings, Welcome to our 2014 Fall issue of the United States Cybersecurity Magazine!   This issue marks our one year anniversary with a timely release for National  Cybersecurity Awareness Month. The United States Cybersecurity Magazine takes our shared responsibility seriously. We collaborate with academia institutions, Cybercrime fighting advertisers, Cybersecurity professionals and experts in the private sector … Read more

From the Summer 2014 Issue

Healthcare is a Growing Target for Cybercrime, and It’s Only Going to Get Worse

Author(s):

Jeff Peters, Editor, SurfWatch Labs

2014 is off to a rough start for healthcare when it comes to cybercrime. A SANS-Norse report stated that healthcare organizations are facing an “epidemic of compromises.”1  A two-year study by Essentia Health, which operates roughly 100 facilities in the Midwest, concluded that most hospital equipment is easy to hack.2   And in April the FBI … Read more

From the Summer 2014 Issue

#CYBERSECURITY CULTURE

Author(s):

Michael Finney, , Mystic Waters Media

Towards the end of his life, Benjamin Franklin penned a letter to a friend. Inside of it he coined one of his most popular phrases, “Nothing can be said to be certain, except death and taxes”. If he were living in our times Franklin would almost definitely add cybersecurity threats to the list. The news … Read more

From the Summer 2014 Issue

Three Digital Security Trends That Are Shaping the U.S. Nuclear Energy Industry

Author(s):

Herbert Richardson, Vice President of Security and Loss Prevention, AREVA, Inc.

Kelsey McCown, Change Management and Communication Specialist, AREVA, Inc.

Suzanne Delica, Engineer and Media Relations Specialist, AREVA, Inc.

The Heartbleed bug. The Stuxnet virus. Digital sabotage. The digital threats to our critical energy delivery infrastructure are growing daily. Our transparent energy supply is increasingly important to protect and digital security is becoming one of the biggest challenges facing utilities and industry suppliers today.  One example of an industry taking proactive steps for digital … Read more