From the Spring 2015 Issue

Calm Your Bits: Why the Internet of Things Doesn’t Have to Be a Security Nightmare

Author(s):

Chris Castaldo, Senior Director of Information Security, 2U

Industry buzzwords are a dime a dozen, but few survive the passage of time. A term that popped into our lexicon in approximately 2006, according to Google Trends, and has been gaining traction in 2014, is the “Internet of Things,” or “IoT.” “Internet of Things” and “Internet of Everything” are terms that have been given … Read more

From the Spring 2015 Issue

2015: What’s Old is New Again

Author(s):

Daren Dunkel, Manager, Enterprise Sales, Amazon Web Services

As 2015 starts, there is no shortage of articles, posts, and interviews projecting the year ahead for cybersecurity trends, attack scenarios, and countermeasures. I have reviewed numerous materials (from McAfee Labs, Trend Micro, FireEye, Websense Security Labs, Symantec, etc.) highlighting similar themes around critical infrastructure, mobile device attacks, and the evolution of hacking in general. … Read more

From the Spring 2015 Issue

Diving into the Deep Web

Author(s):

Kris Martel, EVP of Operations, Chief Information Security Officer, Emagine IT

With all of the recent advancements in technology, including the ability for anyone to know what is going on around the world with just a few keystrokes or finger swipes, it is amazing that anything can be a mystery anymore. When I was young, you had to rely on the newspaper, nightly news programs on … Read more

From the Spring 2015 Issue

from the{PUBLISHER}

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Karen Austin

Greetings,  Welcome to the Spring 2015 issue of the United States Cybersecurity Magazine! We are honored to be able to continue raising the level of awareness of cybercriminality and bringing solutions to the forefront to educate and protect the United States of America’s government, private sector, and citizens. We would like to thank each and … Read more

From the Winter 2015 Issue

Designing A Cybersecurity Solution: Security Reference Architectures

Author(s):

Dr. Eric Yocam, CRISC, CISSP, Adjunct Professor, University of Fairfax

Security reference architectures come in many flavors including industry-based, technology-based and enterprise-specific. When looking for some directional guidance when designing a cybersecurity solution, a cybersecurity professional can leverage the security reference architecture. The cybersecurity solution design may take the form of prevention and/or remediation of a particular prioritized risk found within the risk register. For … Read more

From the Winter 2015 Issue

Preparing the Cybersecurity Workforce Through Creative Partnering

Author(s):

Michael Volk, Cybersecurity Specialist, PSA Insurance & Financial Services

Cybersecurity is an industry that is quickly emerging in the new “Creative Economy” and community colleges are stepping in to prepare the workforce of the future. Just as we have seen in the past, as the economy shifts and workforce needs change, the approach to education and training also must evolve. In this new economic … Read more

From the Winter 2015 Issue

Cybersecurity is a STEMB Field … … and the B Isn’t Silent!

Author(s):

Dr. Mansur Hasib, CISSP, PMP, CPHIMS, Public Speaker and Cybersecurity Leader,

Put together a bunch of passionate academics, government officials, and industry leaders who love to discuss their niche in the vast, exciting, multi-disciplinary field of cybersecurity – and sparks are bound to fly! And this is exactly what happened at the National Initiative for Cybersecurity Education (NICE) conference held in Columbia, Maryland, November 5-6, 2014. … Read more

From the Winter 2015 Issue

Next Generation Espionage

Author(s):

Daren Dunkel, Manager, Enterprise Sales, Amazon Web Services

As we enter the new year we approach the one year anniversary of the Target corporation hack. Their CEO is out of a job, their board of directors is being sued, and the brand has suffered, by some estimates, $1 billion in damages. Unfortunately the Target Corporation is not an isolated example. Recently the headlines, … Read more

From the Winter 2015 Issue

Addressing the Growing Shortage of Cybersecurity Professionals By Creating a Cybersecurity Talent Pipeline

Author(s):

V. N. Berlin, PhD, President, Mission Critical Institute

Accelerating Demand for Cybersecurity Professionals  The demand for job-ready cybersecurity professionals to address the ever-increasing incidents of cyber threats and breaches in both the public and private sectors is projected to grow at a CAGR (Compound Annual Growth Rate) of 13% through 2017. Thus, with over 150K new cybersecurity positions added annually through 2017, industry … Read more