From the Fall 2023 Issue

From the Editor-In-Chief

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, It’s easy to think of cybersecurity as a coldly logical space where the deterministic management of machines and software creates a binary reality.  Do the right thing (for values of “right” that equate to compliance with any of a myriad of frameworks), and security ensues.  Do the wrong thing, which is often perceived as … Read more

From the Fall 2023 Issue

From the Publisher

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Greetings, Welcome to the Fall 2023 issue of the United States Cybersecurity Magazine!   We would like to extend our appreciation to the numerous individuals and organizations for their contributions and sponsorships during the compilation process of this issue.  You have played a significant role in enhancing the United States Cybersecurity Magazine!  We will continue … Read more

From the Fall 2023 Issue

,

Why Cybersecurity Training is Essential for Companies in the Digital Age

Author(s):

Joanne Camarce, Director of PR Operations, uSERP

With the increase in digital technology, cybersecurity has become a vital concern for businesses of all sizes. As technology evolves, so do the methods and techniques of cyber-attacks, and without proper protection, companies can suffer significant financial and reputational losses. Cybersecurity training is no longer a nice-to-have but an essential element for any organization’s security … Read more

From the Fall 2023 Issue

How to Build Your Workforce’s Psychological Cyberdefenses

Author(s):

Dr. Shaun McAlmont, President & CEO, NINJIO

workforce psychological cyberdefenses

When cybercriminals launch social engineering attacks, they’re exploiting the psychological vulnerabilities of their victims. Phishing messages lure victims into clicking on dangerous links or downloading malware with coercive language. Other cyberattacks take advantage of victims’ curiosity by sending fake headlines, offers, and other information that’s calibrated to their interests. No matter what strategies cybercriminals deploy, … Read more

From the Fall 2023 Issue

How to Schedule a Pen Test

Author(s):

Paul Kubler, Red Team Lead, CYBRI

How to Schedule a Pen Test

A frequent occurrence in the cybersecurity world is having to scramble at the end of the year, between holidays, to get the compliance required pen test done. After all, it was probably conducted at the same time last year for the same reasons. This leads to an already overburdened staff dealing with the common holiday … Read more

From the Fall 2023 Issue

Cyber Castles – Building Operational Networks and Cybersecurity

Author(s):

Bayron Lopez Pineda, Graduate Student, Georgetown University, School of Continuing Studies

Henry J. Sienkiewicz, Faculty, Georgetown University

Cyber Castles

In the realm of building security, the concept of “security in depth” has evolved from the medieval fortress to the modern office building. Today’s urban landscape features buildings with historic facades with technologically advanced interiors. In the United States, an estimated 97 billion square feet of commercial real estate (CRE) is integrated with technology depending … Read more

From the Fall 2023 Issue

How Well Are Your Files protected?

Author(s):

Hilary MacMillan, EVP for Engineering, CyLogic

How well are your files protected?

Files are among a company’s most valuable assets and their presence has a very real impact on a company’s viability, to its bottom line, its reputation or legal standing, and its ability to operate and deliver products or services. Consider your company’s files for a moment.  What’s in them?  Financial data?  Confidential plans or product … Read more

From the Fall 2023 Issue

Using and Sharing Sensitive Data Securely – Fact or Miracle?

Author(s):

David W. Archer, PhD, Principal Scientist, Niobium Microsystems and Galois, Inc.

Using and Sharing Sensitive Data Securely

“If it is a miracle any sort of evidence will answer. But if it is a fact, proof is necessary.” Mark Twain Introduction: More Data + More Sharing = Big Security Problem The volume of data we cultivate and harvest grows by almost 40% every year. At the same time, we’re (finally) learning and starting … Read more

From the Fall 2023 Issue

The Significance of Cybersecurity Education in the Era of Digital Innovation

Author(s):

Michelle Moore, Ph.D., Academic Director and Professor, University of San Diego

The Significance of Cybersecurity Education

Tech experts must be tireless in providing top-tier protection against evolving cybercrimes. In many cases, cybercriminals have the means to morph their attacks and evade detection, creating a moving target. The best defense? A well-educated workforce. The impacts of cyber attacks are vast, and consequences of the crimes run the gamut across industries, impacting life … Read more

From the Fall 2023 Issue

5 Emerging Cybersecurity Trends And Technologies For A Future-Ready CIO

Author(s):

Ben Herzberg, Chief Scientist and VP of Marketing, Satori

5 Cybersecurity Trends

Cybersecurity is a cornerstone in our increasingly digital world, a critical line of defense for everything from personal information to national infrastructure. It’s far more than just a necessary evil; it’s an ever-evolving chess game against cyber threats. Our battle against cyber threats is fought on two fronts. First, we’re dealing with escalating threat sophistication, … Read more