From the Spring 2016 Issue

The Nomad Project: Targeting Security and Availability Issues in the Cloud

Author(s):

Henry Au, Electrical Engineer, SPAWAR Systems Center Pacific

Mamadou Diallo, Computer Scientist, SPAWAR Systems Center Pacific

Megan Kline, Mathematician, SPAWAR Systems Center Pacific

Michael August, Cloud and Mobility Engineer, SPAWAR Systems Center Pacific

Patric Petrie, Lead Staff Writer, SPAWAR Systems Center Pacific

Roger Hallman, Mathematician, SPAWAR Systems Center Pacific

Organizations with sensitive data cannot take advantage of cloud computing because of security and availability concerns.  Cloud computing uses the Internet to manage, store, and process data remotely, instead of locally.  The three deployment models of cloud computing, infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS), offer … Read more

From the Spring 2016 Issue

The Roots of the IoT Forest

Author(s):

Lauren Edwards, Director of Marketing, Sysorex

The IoT is often viewed as a hurricane of attention-hungry little pieces of technology strewn about and constantly chatting.  The Internet of Things (IoT) is on track to land a spot on 2016’s “Buzzwords to Avoid” list, but this is a misunderstanding. The Internet of Things isn’t just about connected toasters or watches, and to … Read more

From the Spring 2016 Issue

Automating Cybersecurity Using Software-Defined Networking

Author(s):

Chris Christou, , Booz | Allen | Hamilton

Michael Lundberg, , Booz | Allen | Hamilton

A key enabler of these malicious attacks is system and network misconfiguration, which remains a major cause of information technology (IT) infrastructure vulnerabilities.  Large-scale cyber-attacks continue to make headlines around the world. While data breaches can have catastrophic and costly consequences, hackers can also cause havoc by interrupting organization operations through distributed denial-of-service (DDoS) attacks. … Read more

From the Spring 2016 Issue

The Need for a Cybersecurity Neighborhood Watch

Author(s):

Rick Lipsey, Senior Strategic Cyber Lead, LMI

As crime rates rose in the early 1970s, Americans began coming together to improve the security of their neighborhoods. They established stronger communities, promoted pride, and built trust that brought members together to deter would-be criminals.  They exchanged ideas and best practices for securing their homes and protecting themselves. Collectively and individually, they developed a clearer … Read more

From the Spring 2016 Issue

Restoring Trust in Healthcare

Author(s):

Robert Lord, Co-Founder, Protenus, Inc.

As every medical student graduates from their M.D. program and formally attaches the prefix “Dr.” to their names, they recite the Hippocratic Oath. While this oath has undergone many revisions over the years, it continues to bind students to a centuries-old tradition of physicians and healers. While much of the Oath deals with the literal … Read more

From the Spring 2016 Issue

Read This Before You Get Hacked Again

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

Review: Hacked Again, Scott N. Schober, 2015 The cover of Scott N. Schober’s book, Hacked Again, informs us that “It can happen to anyone – even a cybersecurity expert”. While this tagline is clearly meant to grab a potential reader’s attention, it also happens to be true. The recent wave of high-profile data breaches confirms … Read more

From the Spring 2016 Issue

What Is Coming out of Your Network?

Author(s):

Nathan Hartzell, , Visionist, Inc.

Regularly testing your border defenses and internal network protections are integral to keeping adversaries out of your network. But, to paraphrase a Bible verse, it is not only what goes into a network that causes problems, but what comes out of it. Knowing what is leaking out of your network is a critical component of … Read more

From the Spring 2016 Issue

from the{PUBLISHER}

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Karen Austin

Greetings, Welcome to our 2016 Spring issue of the United States Cybersecurity Magazine!  We are pleased to announce that April marks the month that we are now entering into our 4th year since the announcement of the release of the United States Cybersecurity Magazine. First and foremost we would like to thank all of our … Read more

From the Winter 2016 Issue

The New Chief Information and Security Officer: A Disruptive Agent of Translation

Author(s):

Siobhan MacDermott, Principal, Ernst & Young LLP

Globalization and the Internet of Things have raised the business world’s connectedness to unprecedented levels. As a result of this always-on environment, consumers are demanding immediate and secure access to all kinds of information across multiple platforms and devices. Take that environment and the rapid digitization of information and we have a new world of … Read more

From the Winter 2016 Issue

Cutting through the Noise for Smarter Cybersecurity

Author(s):

James Jasinski, Vice President, Federal Business Development, Fortinet, Inc

Procurement can be challenging in any organization. Gathering requirements, assessing needs, determining the most cost-effective solutions, and finding reliable and trustworthy vendors can tax the savviest of IT organizations. Adding the layers of regulation faced by federal agencies and contractors only compounds procurement issues and decision-making difficulties. Five agencies in the Federal Government (DISA, NSA, … Read more