From the Winter 2016 Issue

Cybersecurity Education’s Cargo Cult

Author(s):

Mark R. Heckman, Ph.D., CISSP, CISA, Professor of Practice, Shiley-Marcos School of Engineering University of San Diego

During the Second World War, isolated island natives in the South Pacific observed how easily Allied military personnel based on the islands could obtain food and other supplies. The soldiers put on headsets, spoke into microphones, and airplanes soon appeared carrying the valuable cargo. When the war ended and the islanders were isolated once again, … Read more

From the Winter 2016 Issue

Cyber Literacy in the Age of Attacks

Author(s):

Dr. Jane A. LeClair, President, Washington Center for Cybersecurity Research & Development

Understanding personal computers’ hardware, operating systems, and applications is a good first step towards obtaining the knowledge and skill necessary for cyber literacy.  Much of the existing cybersecurity literature centers around defending the complex digital systems belonging to large corporations. Much less attention is paid to providing the average user with the basic knowledge and … Read more

From the Winter 2016 Issue

Multinationalism in Digital Forensics

Author(s):

Paul Kubler, Red Team Lead, CYBRI

Native-language tools and exploits have recently started gaining momentum in the ever-growing sphere of multinational cybercrime, as hackers develop tools in their own language. It’s common knowledge that much of the malware discovered today has been written by foreign language-speaking authors. In a speech to the Australian National Press Club two years ago, Eugene Kaspersky … Read more

From the Winter 2016 Issue

ASK THE EXPERTS: Seven Global Leaders Advise on Digital Risk

Author(s):

Daren Dunkel, Manager, Enterprise Sales, Amazon Web Services

“The time for complacency is over. Every company is vulnerable to cyber-attacks and directors have a responsibility to ensure that resources are deployed to detect and defend against them.”  – Nicole Eagan, CEO of Darktrace  In 2015, senior executives and their board members were challenged with cybersecurity threats to their businesses that their predecessors never … Read more

From the Winter 2016 Issue

Rejecting Anonymity: Confronting the Internet’s Insecure Architecture

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

In @War: The Rise of the Military-Internet Complex, Shane Harris wrote:  The Internet offered a cloak of anonymity. Anyone could set up an e-mail address with a fake name using Google or Hotmail, which had millions of customers and kept their data in repositories located around the world. Those people were hard enough to find. … Read more

From the Winter 2016 Issue

from the{PUBLISHER}

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Karen Austin

Greetings,   As 2016 begins, we look forward to yet another year of publishing solutions which contribute to a holistic approach to cybersecurity. Cyber-criminality is a vast, multi-faceted problem, a many-headed hydra stretching across the boundaries of land and sea. Our solution must be multi-faceted as well, formulated to tackle the problem on many fronts. Cybersecurity … Read more

From the Fall 2015 Issue

Cybersecurity and Leadership: A Changing Landscape

Author(s):

Connie Uthoff, Program Director, The George Washington University

Within the past few years the increase of cyber-attacks in both severity and quantity has introduced risks that impact board members and CEOs more directly than ever before. Previously, the boardroom was not a place where members often concerned themselves with cyber- or technology-related issues. Organizations would hire chief technology or chief information officers to … Read more

From the Fall 2015 Issue

REVIEWING LESSONS LEARNED FROM THE INSIDER THREAT

Author(s):

Jim Mazotas, Founder, OnGuard Systems LLC

Larry Letow, CEO, U.S., CyberCX

As the United States observes National Cybersecurity Awareness Month, we are reminded that organizations of all varieties are at risk for cyber-attacks. Even the largest operations are not immune to the serious ramifications that come with security breaches. In order to operate safely and effectively, organizations need to be vigilant about their cybersecurity practices. While … Read more

From the Fall 2015 Issue

If Information Sharing Is Such a Good Thing, Why Aren’t More Companies Doing It?

Author(s):

Ira E. Hoffman, Esq., Of Counsel, Butzel Long

OUR NATIONAL SECURITY RELIES ON OUR ABILITY TO SHARE THE RIGHT INFORMATION, WITH THE RIGHT PEOPLE, AT THE RIGHT TIME. Our national security relies on our ability to share the right information, with the right people, at the right time.1 While the high-profile attacks against Target, e-Bay, Home Depot, Nieman Marcus, JPMorgan Chase, Sony Pictures … Read more

From the Fall 2015 Issue

“Hack-a-Shaq” or Hack Attack

Author(s):

Joseph Bowens, Sr. Signals Analyst, Visionist, Inc.

Shaquille O’Neal was easily one of the top 50 greatest NBA players, if not one of the greatest basketball players of all time. However, over his career, Shaq shot a paltry 0.527 free throw average. With this in mind, Dallas Mavericks coach Don Nelson orchestrated a plan during the 2008 playoffs to put Shaq on … Read more