Skip to content

Menu

United States Cybersecurity Magazine
United States Cybersecurity Magazine
  • Home
  • Magazine
  • Cybersecurity Channels
    • MSSP Services – CISPOINT
    • Security Testing – Corellium
    • Security Software & Services – Wind River
    • Darknet Intelligence – BOC INTEL
  • Cyber Daily
  • Calendar
  • Resources
Welcome! | Subscribe | Sign In
United States Cybersecurity Magazine
  • Home
  • Magazine
  • Cybersecurity Channels
    • MSSP Services – CISPOINT
    • Security Testing – Corellium
    • Security Software & Services – Wind River
    • Darknet Intelligence – BOC INTEL
  • Cyber Daily
  • Calendar
  • Resources
  • Subscribe
  • Sign In

Issue: Fall 2021

From the Fall 2021 Issue

Protecting Your Data

The Most Financially Devastating Form of Cyber-Attacks Can be Thwarted for Free

Author(s):

A.J. Nash, Vice President of Intelligence, ZeroFOX

As ransomware continues to grab most of the headlines in cybersecurity, it’s easy to lose track of the much larger threat of Business Email Compromise (BEC). According to the FBI’s 2020 Internet Crime Report, the … Read more

Digital Convenience of Big Brother
From the Fall 2021 Issue

Cybersecurity & RF Signatures

Digital Convenience or Big Brother? Cool Tech Might Be Our Downfall

Author(s):

Rick Mellendick, Chief Security Officer, Process Improvement Achievers, LLC

In the last few years, there has been a strong increase in Radio Frequency (RF) devices through RF Red Team engagements and RF penetration testing and security vulnerability assessments. This uptick is not just in … Read more

Hackers are Laying Siege to Critical Infrastructure
From the Fall 2021 Issue

Cybersecurity & Critical Infrastructure

Hackers Are Laying Siege to Critical Infrastructure: Here’s How to Fight Back

Author(s):

Ahsan Siddiqui, Director, Product Management, Arcserve

Critical infrastructure is vital for the proper functioning of our society and economy. It is almost impossible to imagine life without a robust network of hospitals, airports, power utilities, and schools. While many people may … Read more

Multiparty Computation Secures Machine Identity
From the Fall 2021 Issue

Cybersecurity & The Modern World

Multiparty Computation Secures Machine Identity in the New Cyber Frontier

Author(s):

Yehuda Lindell, CEO, Unbound Security

The question of identity is fundamental to security. We need to know who is asking for a service so we can be certain about whether they are authorized to access it. For this reason, humans … Read more

SOC Automation
From the Fall 2021 Issue

Cybersecurity & The Modern World

AMPLIFYING YOUR SOC EFFORTS WITH AUTOMATION

Author(s):

Vijay Bharti, SVP, CISO, Happiest Minds Technologies

Organizations are equipped with a host of tools and systems; data centers, applications in the cloud, infrastructure tools comprising servers and networks, security tools comprising anti-virus, firewalls and gateways, and a lot more to support … Read more

The Power of Automation
From the Fall 2021 Issue

Cybersecurity & The Modern World

The Power of Automation

Author(s):

Mari Galloway, CEO, Founding Board Member, Women’s Society of Cyberjutsu

Orchestration and automation are two terms gaining notoriety, praise and progress in cybersecurity. Automation can save an organization 30% or more of their time allowing analysts and engineers to focus on more complex tasks. This … Read more

RISK
From the Fall 2021 Issue

Reducing Risk

Some Risks We Must Accept

Author(s):

Justin Petitt, Strategic Capture Manager, Markon Solutions

Larry Letow, CEO, U.S., CyberCX

“Is that a new breach? Or is it the same one we’re still talking about?” If you think you’re hearing about a company getting hacked almost every day, that’s because you’re paying attention; there were … Read more

What Should Your Home Cybersecurity Setup Look Like_
From the Fall 2021 Issue

Cybersecurity & The Modern World

What Should Your Home Cybersecurity Set Up Look Like?

Author(s):

Alex Haynes, CISO , IBS Software

As we enter National Cybersecurity Awareness Month, it’s easy to forget that your personal security posture in your home environment is just as important as your enterprise environment. There’s so much focus today on enterprise … Read more

The Fourth Industrial Revolution: Securing the Future
From the Fall 2021 Issue

Cybersecurity & The Modern World

The Fourth Industrial Revolution: Securing the Future

Author(s):

Connie Uthoff, Program Director, The George Washington University

In 2016, in his book The Fourth Industrial Revolution, Klaus Schwab, Executive Chairman of the World Economic Forum, suggested that we have entered into a fourth industrial revolution, one defined by emerging technologies where physical and … Read more

Turn Your Company Into an Incubator for Cyber Talent
From the Fall 2021 Issue

Developing the Next Cybersecurity Generation

Turn Your Company Into an Incubator for Cyber Talent

Author(s):

Bill Bonney, President, CISO DRG, Inc.

We started planning our first true getaway vacation since the start of the pandemic, but this vacation would have a bit of a twist. It would be the first time leaving our rescue pup behind. … Read more

Older posts
Newer posts
← Previous Page1 Page2 Page3 Page4 Next →
START READING

TABLE OF CONTENTS

United States Cybersecurity Magazine
  • From the Publisher
  • From the Editor-in-Chief

Sponsored Content

  • Wind River
  • Virginia Tech
  • Cybersecurity and Your Business
    • Stay Ahead of Hackers with ASM
    Cybersecurity & The Modern World
    • Staying Home May Be Good for Your Health, but Is It Good For Agency Security?
    • The Fourth Industrial Revolution: Securing the Future
    • What Should Your Home Cybersecurity Set Up Look Like?
    • The Power of Automation
    • AMPLIFYING YOUR SOC EFFORTS WITH AUTOMATION
    • Multiparty Computation Secures Machine Identity in the New Cyber Frontier
    Developing the Next Cybersecurity Generation
    • Turn Your Company Into an Incubator for Cyber Talent
    Reducing Risk
    • Some Risks We Must Accept
    • A Software Bill of Materials Is Critical for Comprehensive Risk Management
    • Why We Haven’t Solved the Problem of Too Many Software Bugs
    Cybersecurity & Critical Infrastructure
    • Hackers Are Laying Siege to Critical Infrastructure: Here’s How to Fight Back
    Cybersecurity & RF Signatures
    • Digital Convenience or Big Brother? Cool Tech Might Be Our Downfall
    Protecting Your Data
    • The Most Financially Devastating Form of Cyber-Attacks Can be Thwarted for Free
    • The Ardennes, Again
    • The Cyber-Hygiene Mantra
    • How to Manage Challenges of Cloud Migration and Microsoft Vulnerabilities
    • Trade-Offs of Convenience: Social Logins, Password Managers and Other Single Points of Failure in User Authentication
    Cybersecurity & Government
    • Wyoming Takes a Holistic Approach in Cybersecurity Standards for Businesses, Expanding Connections, and Creating Jobs
    • Biden Orders Endpoint Detection and Response (EDR) Initiative
    Developing a Cybersecurity Culture
    • Cultivating Greater Cyber ROI for Cyber Resilience
    • Cyber Hedging: How Cybercriminals May Capitalize on a Decrease in Ransomware Payments by Short Selling Victim Companies
    Cybersecurity Legislation
    • Pros and Cons of Paying Ransomware
    • Patchwork State Privacy Legislation vs Federal Law: Small and Midsize Businesses Would Benefit from One Clear Path
    Cybersecurity & The Threat Landscape
    • Data Exploitation and Cybersecurity – The Power of Combinations
    Risk Mitigation
    • Practicing What We Preach: Working Together to Mitigate Cyber Threats
    • Cybersecurity: The Anatomy of Ransomware Attacks
    Preparing for Cybersecurity Threats
    • Penetration Testing: Why Leaks Need to Be Sealed
    • Synthetic Identity Fraud (SIF): Combating the Phantom Menace
    • Breach and Attack Simulation: The Newest Way to Test Your Defenses

    ISSUE INDEX

    SUBSCRIBE TO OUR CYBERSECURITY COMMUNITY

    Subscribe today for free and gain full access to the
    United States Cybersecurity Magazine and its archives. In addition, via our newsletter, you will hear from cybersecurity subject matter experts, and will be notified of the release of the next issue of the magazine!

    SUBSCRIBE NOW

    US CyberSecurity Magazine

    • Subscribe
    • Log In
    • Home
    • Magazine
    • Cybersecurity Channels
      • ArCybr
      • Security Testing – Corellium
      • Security Software & Services – Wind River
      • BOC INTEL
    • Contact Us
    • About
    • Cyber Daily
    • Calendar
    • Resources
    • Advertise With Us
    • Write for Us
    • Privacy Policy
    Facebook-f Linkedin-in X Instagram Wordpress

    © 2026 American Publishing, LLC™ | 17 Hoff Court, Suite B • Baltimore, MD 21221 | Phone: 443-231-7438
    • Subscribe
    • Log In
    • Home
    • Magazine
    • Cybersecurity Channels
      • ArCybr
      • Security Testing – Corellium
      • Security Software & Services – Wind River
      • BOC INTEL
    • Contact Us
    • About
    • Cyber Daily
    • Calendar
    • Resources
    • Advertise With Us
    • Write for Us
    • Privacy Policy
    We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
    Do not sell my personal information.
    Cookie SettingsAccept
    Manage consent

    Privacy Overview

    This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
    Necessary
    Always Enabled
    Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
    CookieDurationDescription
    cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
    cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
    cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
    cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
    cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
    viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
    Functional
    Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
    Performance
    Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
    Analytics
    Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
    Advertisement
    Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
    Others
    Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
    SAVE & ACCEPT
    Powered by CookieYes Logo