From the Spring 2024 Issue

Shannon’s Dilemma: Securing a Future We Control but Cannot Know

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

The general sat back in her high-backed executive office chair and surveyed the network operations center.  A half-dozen engineers focused intently on the large curved high-definition displays in front of them and two men stood to her right. She nodded to the government program manager.  “Have we gotten all the necessary approvals?”  She knew the … Read more

From the Spring 2024 Issue

Digital Twins: Mirroring Business, Mirroring Cybersecurity Risks

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

Digital Twins

A digital twin is a virtual representation of a physical object, process, or system. Digital twins have emerged as a critical technology that fundamentally changes how companies design, monitor, and maintain their physical assets in today’s rapidly evolving industrial landscape. A digital twin is a virtual representation of a physical object, process, or system. Often … Read more

From the Spring 2024 Issue

The Case for Moving Beyond VPNs: Embracing Conditional Access

Author(s):

Alex Haynes, CISO , IBS Software

The Case for Moving Beyond VPNs: Embracing Conditional Access

In the ever-evolving landscape of cybersecurity, traditional tools, and approaches to securing remote access, such as Virtual Private Networks (VPNs), are increasingly seen as inadequate for the complex demands of modern enterprise environments. The shift towards a more dynamic, distributed workforce, along with the proliferation of cloud services and mobile computing, necessitates a re-evaluation of … Read more

From the Spring 2024 Issue

The Evolution of DoD‘s Cybersecurity Service Provider Program Evaluator Scoring Metrics

Author(s):

Roston Fyle, Cyber Strategist, CSIOS Corporation

Tyson Gee, Chief Compliance Officer, CSIOS Corporation

Introduction In the fast–paced world of cybersecurity, staying ahead of emerging cyber threats is not simply a necessity but an essential, constant challenge. Since its inception, the Department of Defense (DOD) Cybersecurity Service Provider (CSSP) Program has been at the forefront of the Department’s cyberwarfare battleground. Over the years, the Program has morphed significantly and … Read more

From the Winter 2024 Issue

From the Editor-in-Chief

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, Over the last several decades the terms information security and cybersecurity have become conflated to the extent that they’re used interchangeably.  Information security is cybersecurity is information security.  For sources that do identify a difference between the two, it’s often two sides of the same coin: Information security speaks to the attributes of security … Read more

From the Winter 2024 Issue

From the Publisher

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Greetings! It is with immense pleasure that I announce the release of the Winter 2024 issue of the United States Cybersecurity Magazine.  As we move forward in the new year, we are thrilled to bring you the latest insights, trends, and developments in the ever-evolving field of cybersecurity. I would personally like to thank our … Read more

From the Winter 2024 Issue

,

The Unintended Consequences of Connectivity: How a Zero Trust Approach Can Shrink the Attack Surface

Author(s):

Tina Gravel, SVP Global Channels and Alliances , Appgate

Robert Metcalfe, co-inventor of Ethernet and considered one of the founding fathers of the modern Internet, is renowned for many things, but perhaps none more so than his namesake law: Metcalfe’s Law. Metcalfe’s Law was initially presented in 1980 to describe the intrinsic value of a telecommunications network and has since been popularized as ‘The … Read more

From the Winter 2024 Issue

,

It’s Time for Intelligence Teams to Recommend Operational Changes

Author(s):

A.J. Nash, Vice President of Intelligence, ZeroFOX

AJ Nash winter 2022

Increased Focus on Configuration Management and Crown Jewels is Vital to Success Many experts​​ in cybersecurity talk about the need for “intelligence-driven security,” but most consumers don’t know what to do with the Intelligence they are paying for​ or how to measure the value of the actions taken as a result of that Intelligence. This may be somewhat expected for … Read more

From the Winter 2024 Issue

,

What is Cyber Leadership?

Author(s):

Diane M Janosek, PhD, JD, CISSP, LPEC, Senior Legal Advisor, WiCyS Mid-Atlantic

What is Cyber Leadership?

The Case Study of the 2021 Hacking of a Florida Water Treatment Plant We often hear “cyber” and often hear “leadership”. So, what is “cyber leadership” and how is it any different than leading any other senior position in business? First, let us define cyber as a noun with both tangible and intangible aspects.  Cyber … Read more