Shortly after Edward Snowden burst onto the scene in May 2013, we learned -- too late -- that there were multiple “red flags” in his background investigation that should have prevented him from gaining access to the countless numbers of classified National Security Agency (NSA) documents that he leaked. Although Snowden has caused untold damage to U.S. national security, his actions have also triggered a thorough review aimed at improving our security clearance processes. Since these reforms, if and when adopted, will have a substantial impact on contractors seeking or performing contracts involving Cybersecurity, the purpose of this article is . . .
TABLE OF CONTENTS
United States Cybersecurity Magazine
- Wireless Security: Not just 802.11 Anymore
- Eliminating Threat Vectors in Cyber Attacks
- Preventing Friends and Foes from CyberSpying on YOU
- Near-Term Vision of IT Security Threat Monitors
- San Antonio: The Next Hub for Cyber?
- The Psychology of Social Engineering
- How Not to Become the Next Headline: Wake-Up Call by the Largest Data Breach in History
- The Effects of Data Breaches on the Modern Consumer
- Commercial Off-The-Shelf (COTS) vs. Home-Grown Software
- Reduce Risk, Train Your Workforce
- Focusing a Leader’s Lens on Cybersecurity Within a Vast Framework Landscape
- Feature Article
- A Unique Approach to Strengthening Our Nation’s Security and Resiliency