From the Spring 2014 Issue

How Not to Become the Next Headline: Wake-Up Call by the Largest Data Breach in History

Author(s):

T. Casey Fleming, Chairman and CEO, BLACKOPS Partners Corporation

As the largest breach in history unfolded, most executives were both disappointed that it occurred to a great American brand and relieved that it missed them…for now.  Breach! The massive data breach and its resulting fallout is a stark reminder to senior executives and Boards of U.S. companies that they will remain vulnerable 24x7x365 until … Read more

From the Spring 2014 Issue

Preventing Friends and Foes from CyberSpying on YOU

Author(s):

Dr. Christopher V. Feudo, President, University of Fairfax

We all are well aware that cyber attacks continue to increase in complexity, frequency and severity. These malicious cyber activities continue to grow at an unprecedented rate, severely threatening the nation’s public and private information infrastructure, as well as our very essence – our identities, our data, our personal conversations, our finances, and all aspects … Read more

From the Spring 2014 Issue

A Unique Approach to Strengthening Our Nation’s Security and Resiliency

Author(s):

Maureen Thomas, Editorial Board, GovConnects

There are many challenges facing the homeland security enterprise, from enhancing coordination among government agencies and facilitating more effective public-private partnerships, to businesses struggling to succeed in the homeland security marketplace and the challenge with the public and private sectors developing better, cost-effective solutions for our federal, state and local first responders and critical infrastructure … Read more

From the Spring 2014 Issue

Time to DOD Cybersecurity

Author(s):

Jeffrey R. Cook, CPA, CITP, CIPP, IT Audit and Advisory Services Lead, Government Contract Services Group, Aronson LLC

IMPLEMENTING AND PAYING FOR THE NEW DFARS UCTI SAFEGUARDING CONTRACT CLAUSE  Historically, information security on contracts with the Department of Defense was considered necessary for classified but not other types of information. That changed on November 18, 2013, when DoD issued a final rule in the Federal Register that Unclassified Controlled Technical Information (UCTI) is … Read more

From the Spring 2014 Issue

Commercial Off-The-Shelf (COTS) vs. Home-Grown Software

Author(s):

John Scillieri, , Visionist, Inc.

Matthew Loff, , Visionist, Inc.

Which is more secure for your small business?  Introduction  You’ve reached a growing pain many small business owners are familiar with. As your company expanded, employees relied on free email and file sharing services, and you were content with keeping timecards and expense reports in spreadsheets. This worked well enough when you had 5 employees, … Read more

From the Spring 2014 Issue

Wireless Security: Not just 802.11 Anymore

Author(s):

Rick Mellendick, Chief Security Officer, Process Improvement Achievers, LLC

With the increase of organizations establishing wireless networks, including wireless guest networks, as well as creating Bring Your Own Device (BYOD) environments, organizations have increased their susceptibility to newer types of threats. Organizations are struggling to balance convenience with security and too often, convenience is being implemented proactively while security is being implemented reactively. When … Read more

From the Spring 2014 Issue

from the{PUBLISHER}

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Karen Austin

Greetings,  Welcome to our 2014 Spring issue of the United States Cybersecurity Magazine! The United States Cybersecurity Magazine is an intelligent, state-of-the-art magazine published quarterly in a powerful combination of print and digital, all in one integrated package. We must not ignore our enemies. We must make a full commitment to continue to find out … Read more

From the Winter 2014 Issue

Cost Effective Security Assessments in Remote Locations

Author(s):

Gabe Koss, , Pwnie Express

Imagine a large bank. It has large corporate offices in several major cities in the United States and over 1000 branch offices across the country. It even has international branches. All of these different locations mean the bank functions on a large-scale, distributed infrastructure.  Being a bank, like government institutions, they are subject to varying … Read more