From the Winter 2014 Issue

Securely Enabling Bring Your Own Device (BYOD)

Author(s):

Jonathan Halstuch, End User Computing Architect, RackTop Systems, LLC

Companies are allowing and embracing Bring Your Own Device (BYOD) policies within the organization for a multitude of reasons. Reasons for implementing BYOD include increased productivity, simplifying IT, response to employee demand and of course the most popular reason, cost savings. To that end it is important when undertaking the implementation of a BYOD strategy … Read more

From the Winter 2014 Issue

The Contest for Cybersecurity Professionals

Author(s):

Dr. Christopher V. Feudo, President, University of Fairfax

Globalization is a force for both collaboration and competition. It is also proving to be a contest for resources – both natural and human. In an age during which growth is largely a product of creative and technological advancements, those companies that want to dominate their industries must be able to attract and retain talented … Read more

From the Winter 2014 Issue

CYERSECURITY LIABILITIES, COSTS, AND POTENTIAL SAFE HARBORS

Author(s):

Edward J. Tolchin, Esq., Principal, Cybersecurity and Government Contracting Practice Groups, Offit|Kurman, P.A.

Knowledge of where the law is and where it likely is headed is an important aspect of assessing the financial impacts of Cybersecurity decisions.  The impacts of the law on Cybersecurity corporate planning abound. A few examples will suffice to make the point: the European Commission is considering whether to mandate European Union member states … Read more

From the Winter 2014 Issue

The Data Center of Tomorrow

Author(s):

Mark Gilbert, Director, Business Development, COPT Data Center Solutions

While it might be hard to imagine today, it can be argued that the Data Center of the future will be nothing more than an extremely large USB thumb drive. As absurd as that sounds, with the explosion of connected devices, content creation and Big Data analytics, demand is increasing for storage space. A mind … Read more

From the Winter 2014 Issue

BEST PRACTICES FOR SMALL BUSINESS IN CYBERSECURITY FOR 2014

Author(s):

Maureen Thomas, Editorial Board, GovConnects

(Howard County, MD) It is the time of year for reviewing your business plan for 2014 and making a few updates to improve operations. Your New Year’s Wish List probably includes the government avoiding another shut-down, or sequestration disappearing in 2014, or perhaps that the Pentagon will figure out its budget priorities, or all of … Read more

From the Winter 2014 Issue

Security in a Mobile World

Author(s):

James Screven, Staff Reporter,

Defining the Problem  As the workplace continues to transform and workers continue to seek out non-traditional work spaces, employees will increasingly work more from mobile devices. Laptops, tablets, hybrid convertibles (laptop/tablet) and smartphones have liberated us from the cubicle, while corporations have benefitted from this mobile device revolution through increased productivity. Mobility, albeit liberating, brings … Read more

From the Winter 2014 Issue

Building a Digital Nation through Educational Strategies – A Perspective

Author(s):

Leslie Grove, STEM Bridge Coordinator, National STEM Consortium

The National STEM Consortium (NSC) is a collective of ten community colleges in nine states developed to create and implement five, nationally portable, industry certifications. The certifications include Cyber Technology, Composite Materials, Electric Vehicle Technology, Environmental Technology and Mechatronics. The National STEM Consortium also delivered the STEM Bridge, a two part program established to increase … Read more

From the Winter 2014 Issue

Cyber Attacks Aimed at First Responders

Author(s):

Alan S. Tilles, Esquire, Attorney, Shulman Rogers

Best Practice Checklist Developed for PSAP Lines to Minimize Risks If you are a regular reader of this magazine, you are well aware of the problems that denial of service (DoS) attacks can have on a business or an individual. The dangers of cyber attacks on utilities has been written about and discussed over and … Read more

From the Winter 2014 Issue

On the Convergence of Electronic and Cyber Warfare

Author(s):

Anthony J. Stephens Sr., Chief Technology Officer, Cybersecurity Business Sector, The MIL Corporation

Integration of Cyber and Electronic Warfare capabilities has emerged as a principal concern for the U.S. Military. The Air Force, Army, and Department of the Navy are all concerned with developing technologies that will enable Cyber and Electronic Warfare operations from common platforms. The Army has already begun to incorporate, what they’re calling, Cyber Electromagnetic … Read more

From the Winter 2014 Issue

from the{PUBLISHER}

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Karen Austin

Greetings,  Welcome to our 2014 Winter issue of the United States Cybersecurity Magazine! We are a quarterly publication, print and digital with realistic page turning featuring articles, stories and advertisements pertaining to all aspects of Cyber ranging from vulnerability to prevention to protection. The year is 2014. We are living in a whole new culture. … Read more