In his 1935 book, War is a Racket1, retired Marine Corps Major General (and two-time Medal of Honor recipient) Smedley Butler2 discussed the financial incentives and commercial benefits that lead nations to engage in armed conflict. Modern day motivations are no different. Verizon reported that, in 2016, “89% of breaches had a financial or espionage motive.”3 Malicious activity in cyberspace is, to borrow Butler’s words, a racket designed to make money by stealing data with exploitable value. If knowledge is power, that knowledge is particularly empowering. Understanding motivations enables the crafting of a deterrent strategy that discourages . . .
TABLE OF CONTENTS
United States Cybersecurity Magazine
- INDEPENDENCE & OBJECTIVITY: Fundamental Best Practices for Cybersecurity Assessments
- Security Through Inclusion
- National Security and Technological Adaptation
- It’s Not the Breach, It’s the Data: A Case for Deterrence by Denial
- 10 Steps to Risk Management: Compliance and Risk Mitigation in a Sea of Data Security Risk
- EDUCATE or TRAIN for CYBERSECURITY?
- Feature Article
- CompTIA Trade Association Promotes Symbiotic Benefits For The IT Ecosystem
- Army Turns to Aberdeen Proving Ground for Cyber Capabilities
- Navigating a Hostile Cyberspace: A Primer for Small Business
- The Differences Between Data, Information, and Intelligence
- WHAT’S THE WEATHER? Enhancing Cybersecurity with External Intelligence
- Tactical, Operational, and Strategic Cyber Attribution: What are they and what does future U.S. policy need to change.