From the Fall 2022 Issue

From the Publisher

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Greetings, Welcome to the Fall 2022 issue of the United States Cybersecurity Magazine!  As always, we’d like to take a moment to thank our supporters, members, sponsors, contributors, and everyone else who makes the magazine possible.  All of us here at the United States Cybersecurity Magazine remain committed to bringing you, our readers, the best … Read more

From the Fall 2022 Issue

From the Editor-in-Chief

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, We’re in the midst of a national security crisis of epic proportions.  It’s not due to the economy, although it will impact the economy.  It has little to do with the ongoing conflict in Ukraine, although it bears on America’s ability to foresee, deter, and manage such conflicts in the future.  And it’s not … Read more

From the Fall 2022 Issue

Integrity Matters

Author(s):

Malcolm Harkins, Chief Security and Trust Officer, Epiphany Systems

Integrity Matters

“A true leader has the confidence to stand alone, the courage to make tough decisions, and the compassion to listen to the needs of others. He (she) does not set out to be a leader, but becomes one by the equality of his (her) actions and the integrity of his (her) intent.” – Douglas MacArthur … Read more

From the Fall 2022 Issue

Ransomware Resiliency for Storage and Backup: Trends, Threats & Tips

Author(s):

Doron Pinhas, CTO, Continuity

ransomware-resiliency-doron-pinhas

Background Ransomware attacks have been in the public eye for quite a while now. Growth is propelled not only by the surge in the number of cybercrime groups specializing in ransomware, but to a large extent, also by the continual increase in attack sophistication. Ransomware has evolved into a fully-fledged industry, with competing groups that … Read more

From the Fall 2022 Issue

Risk and Responsibility in the Age of the Cloud

Author(s):

Daren Dunkel, Manager, Enterprise Sales, Amazon Web Services

cloud risk and responsibility

One common question asked when companies look to cloud computing is, “How secure is the cloud?” It’s a crucial question considering the vast majority of organizations are still on premise or in the early days of their cloud migrations. Amongst the many issues to consider are the following: The safe migration and access of key … Read more

From the Fall 2022 Issue

Government and Industry Cooperation: More Important Than Ever for Cybersecurity Awareness

Author(s):

Chuck Brooks, President , Brooks Consulting International

govt-and-industry-coop

With another National Cybersecurity Awareness Month upon us, few major things have changed from the past year in terms of threats. As the capabilities and connectivity of cyber devices have grown, so have the cyber intrusions from malware and hackers.  The cyber- threat actor ecosystem has grown in both size and sophistication.  They are also … Read more

From the Fall 2022 Issue

Zero Trust is Not a Product

Author(s):

Alex Haynes, CISO , IBS Software

Zero Trust is Not a Product

Every year at the bevy of conferences that dot the Information Security landscape you can always detect an inherent theme. This may be influenced by acute threats (i.e., Ransomware), a new regulatory environment (i.e., GDPR) or even just a sudden change in how we work, as we all experienced during the pandemic. The issue Zero … Read more

From the Fall 2022 Issue

Five Ways to Solve the Cybersecurity Skills Gap

Author(s):

Jayant Kripalani, Consulting Sales Engineer - Security, Splunk

Five Ways to Solve the Cybersecurity Skills Gap

An effective cybersecurity strategy encompasses an organization’s people, processes, and technology. While processes and technology are in a constant state of iteration and improvement, hiring and retaining talented people in cybersecurity roles has been an issue for at least a decade—and it’s getting worse. Information Systems Security Association International (ISSA) reports that in 2021, more … Read more

From the Fall 2022 Issue

7 Reasons to Deploy Continuous Identity Confirmation Technology in Your VDI Environment

Author(s):

Paul Baker, Director of Channel Sales, Plurilock Security, Inc.

CICT in VDI Feature

Many organizations have accelerated the adoption of Virtual Desktop Infrastructure (VDI) in light of changing work strategies. However, how can you confirm that the user remotely signed in to a virtual desktop is the authorized user rather than a stranger in possession of a stolen session or stolen credentials? This article will look at the … Read more

From the Fall 2022 Issue

Cybersecurity Threats: How to Monitor For and Report Them

Author(s):

Shannon Walker, Founder and President, Whistleblower Security Inc.

Cybersecurity Threats

Businesses face the threat of potential cyber-attacks every day. Whether they are large or small, companies are exposed to risks from hackers wanting to steal sensitive data or disrupt operations. Consider the following cases. In 2015, Dr. David Kreir’s small business, Volunteer Voyages, incurred $14,000 in fraudulent charges after a thief stole their online debit … Read more