From the Fall 2021 Issue

The Ardennes, Again

Author(s):

David W. Archer, PhD, Principal Scientist, Niobium Microsystems and Galois, Inc.

Thin Red Line

Zero-Day, Zero Trust, and the 99th Infantry Division  Zero Day December 16, 1944. Unexpected Allied success after D-Day led to a thin defensive line in the Ardennes forest. Armed with that knowledge and suspecting weakness in the Allies’ resolve, Hitler swung his last big hammer in an attempt to shatter the alliance and force a truce. … Read more

From the Fall 2021 Issue

The Most Financially Devastating Form of Cyber-Attacks Can be Thwarted for Free

Author(s):

A.J. Nash, Vice President of Intelligence, ZeroFOX

As ransomware continues to grab most of the headlines in cybersecurity, it’s easy to lose track of the much larger threat of Business Email Compromise (BEC). According to the FBI’s 2020 Internet Crime Report, the Internet Crime Complaint Center (IC3) received 2,474 complaints of ransomware that resulted in $29.1M in financial loss.[1] While it is … Read more

From the Fall 2021 Issue

Digital Convenience or Big Brother? Cool Tech Might Be Our Downfall

Author(s):

Rick Mellendick, Chief Security Officer, Process Improvement Achievers, LLC

Digital Convenience of Big Brother

In the last few years, there has been a strong increase in Radio Frequency (RF) devices through RF Red Team engagements and RF penetration testing and security vulnerability assessments. This uptick is not just in the corporate offices but outside of the offices as well. There also has been a notice of growth in non-standard … Read more

From the Fall 2021 Issue

Hackers Are Laying Siege to Critical Infrastructure: Here’s How to Fight Back

Author(s):

Ahsan Siddiqui, Director, Product Management, Arcserve

Hackers are Laying Siege to Critical Infrastructure

Critical infrastructure is vital for the proper functioning of our society and economy. It is almost impossible to imagine life without a robust network of hospitals, airports, power utilities, and schools. While many people may take these services for granted, you can ensure that cyber-attackers understand how dependent we are on them. Thanks to the … Read more

From the Fall 2021 Issue

Multiparty Computation Secures Machine Identity in the New Cyber Frontier

Author(s):

Yehuda Lindell, CEO, Unbound Security

Multiparty Computation Secures Machine Identity

The question of identity is fundamental to security. We need to know who is asking for a service so we can be certain about whether they are authorized to access it. For this reason, humans need to authenticate before accessing almost anything. Consumers may understand why it is important, even if it does occasionally cause … Read more

From the Fall 2021 Issue

AMPLIFYING YOUR SOC EFFORTS WITH AUTOMATION

Author(s):

Vijay Bharti, SVP, CISO, Happiest Minds Technologies

SOC Automation

Organizations are equipped with a host of tools and systems; data centers, applications in the cloud, infrastructure tools comprising servers and networks, security tools comprising anti-virus, firewalls and gateways, and a lot more to support various enterprise functions. While the whole organization is spread across multiple areas, it is the Security Operations Center (SOC) that … Read more

From the Fall 2021 Issue

The Power of Automation

Author(s):

Mari Galloway, CEO, Founding Board Member, Women’s Society of Cyberjutsu

The Power of Automation

Orchestration and automation are two terms gaining notoriety, praise and progress in cybersecurity. Automation can save an organization 30% or more of their time allowing analysts and engineers to focus on more complex tasks. This time translates to 100’s of thousands of dollars over the course of a year. With so many options to choose … Read more

From the Fall 2021 Issue

Some Risks We Must Accept

Author(s):

Justin Petitt, Director, Cybersecurity Center of Excellence, Edgewater Federal Solutions

Larry Letow, CEO, U.S., CyberCX

RISK

“Is that a new breach? Or is it the same one we’re still talking about?” If you think you’re hearing about a company getting hacked almost every day, that’s because you’re paying attention; there were over 1,300 significantly damaging breaches of large businesses last year. That’s more than three per day on average, and that’s … Read more

From the Fall 2021 Issue

What Should Your Home Cybersecurity Set Up Look Like?

Author(s):

Alex Haynes, CISO , IBS Software

What Should Your Home Cybersecurity Setup Look Like_

As we enter National Cybersecurity Awareness Month, it’s easy to forget that your personal security posture in your home environment is just as important as your enterprise environment. There’s so much focus today on enterprise security that it’s easy to overlook something that can have as much impact on your day to day as in … Read more

From the Fall 2021 Issue

The Fourth Industrial Revolution: Securing the Future

Author(s):

Connie Uthoff, Program Director, The George Washington University

The Fourth Industrial Revolution: Securing the Future

In 2016, in his book The Fourth Industrial Revolution, Klaus Schwab, Executive Chairman of the World Economic Forum, suggested that we have entered into a fourth industrial revolution, one defined by emerging technologies where physical and virtual systems work together.  He emphasized that, unlike the past, the fusion of breakthrough technologies like nanotechnology, 5G, 3D printing, … Read more