ProcessBolt
From the Fall 2016 Issue

Safeguarding American Democracy: Outcome-Based Cybersecurity in Election 2016

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

If you’re asking how foreign hackers can be prevented from manipulating the election, you’re asking the wrong question.  On May 31st, 1916, the British battlecruisers Indefatigable, Queen Mary, and Invincible were sunk within two and a half hours by the Imperial German Navy’s High Seas Fleet during the Battle of Jutland. In response to the … Read more

From the Fall 2016 Issue

SDN FORENSICS – A CHALLENGE

Author(s):

Chris Christou, , Booz | Allen | Hamilton

Emre Ertekin, , Booz | Allen | Hamilton

Greg Starkey, , Booz | Allen | Hamilton

Joseph Bull, , Booz | Allen | Hamilton

Michael Lundberg, , Booz | Allen | Hamilton

Michael McAlister, , Booz | Allen | Hamilton

Tyler Duquette, , Booz | Allen | Hamilton

Winfield Arnott, , Booz | Allen | Hamilton

SOFTWARE DEFINED NETWORKING – A NEW PARADIGM  Software-defined networking (SDN) provides a new approach to networking by separating the functions of data switching and switch control. SDN permits better global network configuration and control by consolidating network topology and control information into a single controller. Information that is typically found distributed across routing and switching … Read more

From the Fall 2016 Issue

The Next Generation of Cybersecurity Experts

Author(s):

Dr. Hamilton Turner, Senior Director, Research and Engineering, OptioLabs, Inc.

William Thornhill, Summer Intern, OptioLabs, Inc.

I have always been captivated by technology. Whether it be playing video games, spending hours messing around on my computer, or always having a mobile device in my hand, I have always had an interest in all things tech. As a freshman at Loyola Blakefield, I discovered the blossoming Cyber Security Club (CSC). My involvement … Read more

From the Fall 2016 Issue

We’ve Come a Long Way… But Are We There Yet?

Author(s):

Dr. Jane A. LeClair, President, Washington Center for Cybersecurity Research & Development

The U.S. is currently facing a severe shortage of qualified professionals to fill the hundreds of thousands of vacancies in IT and cybersecurity. Worldwide, there is a shortfall of over one million professionals, according to some accounts.1 Writing for CSO Online, Steve Morgan reports that “More than 209,000 cybersecurity jobs in the U.S. are unfilled, … Read more

From the Fall 2016 Issue

Protecting a University in the New Era of Cybercrime: A Case Study

Author(s):

-William J. "Bill" Britton, Vice President of Information Technology and Chief Information Officer, California Polytechnic State University

Higher education environments thrive on collaboration, research, and the exchange of ideas both inside and outside the university. However, creating an open network to foster that kind of sharing—that is both easy to connect to and secure—is an increasingly complex issue facing universities. Because of the amount of intellectual property, research, and sensitive personal information … Read more

From the Fall 2016 Issue

from the{EDITOR-IN-CHIEF}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, October is National Cyber Security Awareness Month (NCSAM). NCSAM is an annual campaign sponsored by the National Cyber Security Division (NCSD) within the Department of Homeland Security (DHS) and the National Cyber Security Alliance (NCSA), a non-profit organization that encourages everyone and anyone who uses technology to be vigilant and prudent with respect to … Read more

From the Fall 2016 Issue

from the{PUBLISHER}

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Karen Austin

Greetings, Welcome to our 4th year of publishing the United States Cybersecurity Magazine! The month of October is National Cyber Security Awareness Month, and we continue to support our nation’s cyber-defense by providing the latest information regarding cyber threats, and solutions to those threats, for cybersecurity teams within the government, the military, and the private … Read more