From the Fall 2013 Issue

NSA creates partnership with North Carolina State University

Author(s):

National Security Agency/Central Security Service, ,

New Laboratory Focuses on Big Data Analysis  The National Security Agency and North Carolina State University have partnered to establish the Laboratory for Analytic Sciences (LAS) on NC State’s Centennial Campus in Raleigh. Located near Research Triangle Park, the laboratory will be a cornerstone of the emerging advanced data innovation hub at NC State, bringing … Read more

From the Fall 2013 Issue

Biography: General Keith B. Alexander, United States Army

Author(s):

National Security Agency/Central Security Service, ,

General Keith B. Alexander, USA, is the Commander, U.S. Cyber Command (USCYBERCOM) and Director, National Security Agency/Chief, Central Security Service (NSA/CSS), Fort George G. Meade, MD. As Commander, USCYBERCOM, he is responsible for planning, coordinating and conducting operations and defense of DoD computer networks as directed by USSTRATCOM. As the Director of NSA and Chief … Read more

From the Fall 2013 Issue

NSA Announces Four New Schools for Cyber Initiative

Author(s):

National Security Agency/Central Security Service, ,

NSA Announces Four New Schools for Cyber Initiative  Four new schools have been selected for the National Security Agency’s National Centers of Academic Excellence in Cyber Operations Program, which was designed to cultivate more U.S. cyber professionals in an ever-changing global environment. After a rigorous application and screening process, NSA selected the following schools to … Read more

From the Fall 2013 Issue

Look Out Palo Alto – Here Comes Howard County! The New Epicenter within a Federal Contracting Valley…

Author(s):

Maureen Thomas, Editorial Board, GovConnects

(Howard County, Maryland) Howard County-based businesses are providing the newest form of triage for security hungry customers who just can’t get enough – Cybersecurity. Customers include health-care providers, major mainframe computer manufacturers, mobile device makers, telecommunication businesses and oil companies. With predictions of a major cyber-attack ever looming, and daily press reports of attacks on both … Read more

From the Fall 2013 Issue

Operating with Privacy in the Wild, Wild West of Wireless Technologies

Author(s):

Ronald J. Waranowski, ,

Look at the current state of the mobile wireless landscape. iPads used both at home and the office, smartphones with GPS tracking on in the background, business laptops automatically connecting to the local coffee shop’s wi-fi network, and personal and business applications running on the same smart devices, all connected and transmitting private information via … Read more

From the Fall 2013 Issue

Location, A Must for Mobile Security

Author(s):

Sage Osterfeld, , AirPatrol Corp.

The smartphone isn’t much of a phone anymore. According to a recent study from O2 research, the smartphone, which is 80% of all the phones sold over the past couple of years, is used for phone calls a paltry 9% of the time. Email, games, music and social media are all more popular uses. More … Read more

From the Fall 2013 Issue

Diffusing cyber threats starts with intelligence and people

Author(s):

Lockheed Martin, ,

Cyber security is at the core of all we do at Lockheed Martin. From the sophisticated aircraft we develop, to the data analytics solutions we provide, we ensure our customers’ platforms and systems are protected from cyber attacks. Today, Lockheed Martin is the foremost expert in delivering the intelligence driven defense approach necessary to thwart … Read more

From the Fall 2013 Issue

from the{PUBLISHER}

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Karen Austin

Greetings,  Welcome to the first issue of the United States Cybersecurity Magazine, a quarterly publication featuring articles, stories and advertisements pertaining to all aspects of Cyber ranging from vulnerability to prevention to protection. My staff and I are working diligently to bring up-to-date information to the foreground. This is 2013 and we are living in … Read more