Despite best efforts, the cybersecurity professional has yet to be able to adequately handle what people refer to as “The User Problem”. A user will inevitably click on a phishing link. A user will inevitably fall prey to a social engineer. A user will click on a malicious web link. A user will accidentally email data to the wrong person. This is why all studies indicate that 90% or more significant attacks result from the user as a primary attack vector . . .
TABLE OF CONTENTS
United States Cybersecurity Magazine
- Radio Frequency Operations and Training From a Virtually Different Point of View
- Human Security Engineering: A New Model for Addressing the “User Problem”
- Safety Or Simplicity? The Costs Of Convenience In Our Connected Life
- The Key is Under the Mat, and We Left the Lights On
- Cyber Doomsday on Wall Street
- Rise of the Chief Intelligence Officer (CINO)
- Holistic Threat Intelligence: New Trends & Successes
- Diversity and Inclusion in Cybersecurity and Technology
- Addressing Skills and the Gender Gap in Cybersecurity
- Recovering from Catastrophic Data Loss
- Telemedicine is Not Going Anywhere – Where’s the Security Infrastructure to Back It Up?
- Cybersecurity: The Danger of Comfort Zones
- Five Best Practices for Cloud Security
- Human Psychology Toward Cybersecurity Can Build Value as a Business Enabler
- How Much is Too Much When Paying Out a Reward for a Vulnerability?