Skip to content

Menu

United States Cybersecurity Magazine
United States Cybersecurity Magazine
  • Home
  • Magazine
  • Cybersecurity Channels
    • MSSP Services – CISPOINT
    • Security Testing – Corellium
    • Security Software & Services – Wind River
    • Darknet Intelligence – BOC INTEL
  • Cyber Daily
  • Calendar
  • Resources
Welcome! | Subscribe | Sign In
United States Cybersecurity Magazine
  • Home
  • Magazine
  • Cybersecurity Channels
    • MSSP Services – CISPOINT
    • Security Testing – Corellium
    • Security Software & Services – Wind River
    • Darknet Intelligence – BOC INTEL
  • Cyber Daily
  • Calendar
  • Resources
  • Subscribe
  • Sign In

Issue: Fall 2014

From the Fall 2014 Issue

Cybersecurity & Your Business

Maryland – Cash Investments and Tax Credits Add Up to Business Success for Cybersecurity Companies

Author(s):

Andrew L. Bareham, CPA, MST, Principal, State and Local Tax (SALT) Chair, KatzAbosch

The Internet Age has changed the business environment in the world. For instance, Silicon Valley in California has become the home to many high-tech business giants. New businesses attracted to Silicon Valley have brought high-paying … Read more

From the Fall 2014 Issue

Cybersecurity & Government

Market Intelligence: The Key to Government Business Development

Author(s):

Kim Harwell, National Procurement Manager, National Bid Network/GovPurchaseUnited

Increasingly, every day of every week, of every month, of every year, more business is being conducted online. Federal, state and local government prime contracting, subcontracting and teaming are no exception. In fact, most government … Read more

From the Fall 2014 Issue

Cybersecurity & Government

5 Things to Do Today to Increase the Value of Your Government Contracting Business

Author(s):

Pat Lowry, MBA, ASA, CVA, , Patuxent Valuation Group LLC

Realtors are asked for their tips on selling homes, chefs are asked for their secret spices, and cops are asked how to get out of speeding tickets. Me? I’m constantly asked what’s most important to … Read more

From the Fall 2014 Issue

CyberThreat Landscapes – The Human Factor

Hunting with Cyber Threat Intelligence

Author(s):

Robert S. Johnston, ,

Do the current techniques to conduct incident management and response constitute an effective counter threat operation?  In today’s threat landscape, chasing down alerts from your SEIM may not be enough to catch the most advanced … Read more

From the Fall 2014 Issue

CyberThreat Landscapes – The Human Factor

Corporate America is Being Attacked and the Entry Vector May Be Surprising

Author(s):

Rick Mellendick, Chief Security Officer, Process Improvement Achievers, LLC

“Corporate America is under attack” has become a more regular headline with media outlets. Such reports often describe the attack and loss, but few explain why it happened and even fewer take the time to … Read more

From the Fall 2014 Issue

Protecting Your Data

Your Network is Secure But Where is Your Data?

Author(s):

David K. Shepherd, CISSP, PMP, Senior Consultant, LMI

The Problem One of your most productive engineers has spent the last month working on a deliverable for your biggest client. The final document is over 200 pages and includes complex engineering drawings, schematics of … Read more

From the Fall 2014 Issue

Protecting Your Data

Know Thy Neighbor: The Dark Side of the Cloud Community

Author(s):

Eric Bednash, CEO, RackTop Systems

Think about the process of buying a new home. There are certain criteria you look for such as the number of bedrooms, lot size, school district and the ever important – location. The latter is, … Read more

From the Fall 2014 Issue

Protecting Your Data

Cloud Vulnerability – Scanning Options for Enterprises

Author(s):

Kellep A. Charles, Information Security Analyst/Researcher, SecurityOrb, LLC

Many enterprises wisely consider regular security vulnerability scans on information processing systems to be a vital component of their security programs. They allow the administrator to locate security weaknesses, assist in asset management and, most … Read more

From the Fall 2014 Issue

Cybersecurity & The Modern World

Cybersecurity Culture and Compliance

Author(s):

Dr. Mansur Hasib, CISSP, PMP, CPHIMS, Public Speaker and Cybersecurity Leader,

CYBERSECURITY DEFINED While attending several cybersecurity conferences recently I noticed a lack of a common understanding of what cybersecurity is. I also noticed some confusion between cybersecurity and information assurance. I observed that many cybersecurity … Read more

From the Fall 2014 Issue

Cybersecurity & The Modern World

WAS I HACKED?

Author(s):

Gordon M. Mumpower, Jr., CPCU, MBA, President, Commercial Insurance Managers Inc.

I was attacked by the Keylogger malware! It started like any other day at home waiting for the laptop to acquire the internet.  I was receiving unexpected advertising pop-ups. I called a computer tech friend … Read more

Older posts
Page1 Page2 Page3 Next →
START READING

TABLE OF CONTENTS

United States Cybersecurity Magazine
  • from the{PUBLISHER}
Cybersecurity & Your Business
  • Why Your Business Should Use Two-Factor Authentication
  • O (Big) Brother, Where Art Thou?
  • Maryland – Cash Investments and Tax Credits Add Up to Business Success for Cybersecurity Companies
Cybersecurity & Government
  • Chinese Hackers and Their New Target- Federal Employees
  • Their Own Worst Enemies-DoD Responds to Insider Threats
  • 5 Things to Do Today to Increase the Value of Your Government Contracting Business
  • Market Intelligence: The Key to Government Business Development
Education
  • Taking the Lead on a Regional Approach to Solving Cybersecurity Workforce Challenges
  • Strengthening the Brain of the Cyberwarrior: Using Neuroscience to Improve Education
CyberThreat Landscapes – The Human Factor
  • America’s Biggest Threat: Economic Espionage and the Theft of Innovation
  • Corporate America is Being Attacked and the Entry Vector May Be Surprising
  • Hunting with Cyber Threat Intelligence
Cybersecurity & The Modern World
  • Intel and the Internet of Things
  • WAS I HACKED?
  • Cybersecurity Culture and Compliance
Cybersecurity & Healthcare
  • Is Healthcare Ready for BYOD?
Legal
  • INTERNATIONAL COOPERATION IN COMBATING CYBERTHREATS: THE U.S. – ISRAEL EXAMPLE
Featured Article
  • CyberMaryland: Creating The Right Adaptive Framework For Cybersecurity
Protecting Your Data
  • Cloud Vulnerability – Scanning Options for Enterprises
  • Know Thy Neighbor: The Dark Side of the Cloud Community
  • Your Network is Secure But Where is Your Data?

ISSUE INDEX

SUBSCRIBE TO OUR CYBERSECURITY COMMUNITY

Subscribe today for free and gain full access to the
United States Cybersecurity Magazine and its archives. In addition, via our newsletter, you will hear from cybersecurity subject matter experts, and will be notified of the release of the next issue of the magazine!

SUBSCRIBE NOW

US CyberSecurity Magazine

  • Subscribe
  • Log In
  • Home
  • Magazine
  • Cybersecurity Channels
    • ArCybr
    • Security Testing – Corellium
    • Security Software & Services – Wind River
    • BOC INTEL
  • Contact Us
  • About
  • Cyber Daily
  • Calendar
  • Resources
  • Advertise With Us
  • Write for Us
  • Privacy Policy
Facebook-f Linkedin-in X Instagram Wordpress

© 2026 American Publishing, LLC™ | 17 Hoff Court, Suite B • Baltimore, MD 21221 | Phone: 443-231-7438
  • Subscribe
  • Log In
  • Home
  • Magazine
  • Cybersecurity Channels
    • ArCybr
    • Security Testing – Corellium
    • Security Software & Services – Wind River
    • BOC INTEL
  • Contact Us
  • About
  • Cyber Daily
  • Calendar
  • Resources
  • Advertise With Us
  • Write for Us
  • Privacy Policy
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
Powered by CookieYes Logo