From the Spring 2017 Issue

Tactical, Operational, and Strategic Cyber Attribution: What are they and what does future U.S. policy need to change.

Author(s):

Matthew C. Kurnava, MA Homeland Security/Cybersecurity,

The Growth of Cyber Attacks  Cyber-attacks are growing in frequency and sophistication. The numbers are staggering. The “AT&T Cybersecurity Insights Report” noted a 62% increase in DDoS attacks and a 458% increase in malicious actors … Read more

From the Spring 2017 Issue

Army Turns to Aberdeen Proving Ground for Cyber Capabilities

Author(s):

Dan Lafontaine, Public Affairs Specialist, DSA Inc. Supporting U.S. Army Program Executive Office C3T

Paul D. Mehney, Director, Public Communications U.S. Army Communications and Electronics Command

The boundaries between traditional cyber threats, such as the penetration of a network and theft of data, and more traditional electronic warfare threats, such as the employment of improvised explosive devices that use the electromagnetic … Read more

From the Spring 2017 Issue

10 Steps to Risk Management: Compliance and Risk Mitigation in a Sea of Data Security Risk

Author(s):

Keith Moulsdale, Co-Chair, Cybersecurity, Data Management & Privacy Group, Whiteford, Taylor & Preston LLP

If you’re drowning in a sea of fast-changing, complex information about data security, you are in good company. It seems that every day new and modified threat methods and vectors appear; another vendor knocks on … Read more