From the Spring 2019 Issue

Data Minimization: How It Can Save Your Enterprise if Breached

Author(s):

Sameer Ahirrao, Founder and CEO, Ardent Security

Data Minimization

Introduction: “We must pass laws that require data minimization, ensuring companies do not keep sensitive data that they no longer need,” U.S. Senator Mark Warner and Vice Chairman of Senate Intelligence committee stated recently after a data breach at Marriott’s Starwood subsidiary. Marriott initially indicated that 500 million customers’ data was exposed. After three weeks, … Read more

From the Spring 2019 Issue

Incident Response: Making the Most of the Attorney-Client Privilege and the Work Product Doctrine

Author(s):

Razvan Miutescu, Privacy Counsel, Whiteford, Taylor & Preston

Incident Response

Organizations in the U.S. are faced with a growing web of complex foreign, federal, and state privacy and data protection laws that apply to their operations. Running afoul of these laws, particularly by suffering a data breach, is often met with an increased likelihood of litigation, including class actions. This article is a short guide … Read more

From the Spring 2019 Issue

Identity Theft: Common Sense is not Common

Author(s):

John Evans, Chief Operations Officer, Front Sight Protection

Sofia Cardante, Risk Manager, Front Sight Protection

Identity Theft

According to statistics and conversations with analysts from the Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), Internet Crime Complaint Center (IC3), and members of the Federal Trade Commission’s (FTC) Consumer Sentinel Network, global identity theft is most prevalent in the United States with over 780 million … Read more

From the Spring 2019 Issue

An Information Security Triality: Balancing Security, Surveillance, and Convenience

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Information Triality

Information security cultural iconography focuses on heroic and demonic archetypes, resulting in a pageant of evocative, emotional imagery that influences reportage, regulation, acquisition, enterprise governance, and the choices made by individuals with respect to their digital personae. The angels (in the epic struggle in the wires between good and evil) are the network defenders. They … Read more

From the Spring 2019 Issue

The Role of Voice Authentication in Cybersecurity

Author(s):

Justin Petitt, Director of Cybersecurity, Systems Engineering Solutions Corporation

Larry Letow, Operating Partner, Interprise Partners, Executive Vice President, Myriddian LLC

Voice Authentication

Everyone loves to talk about the future of cybersecurity. However, most do not realize that in doing so, they’re using one of the most secure tools available to facilitate that conversation, the human voice. The voice connects us person-to-person, and when used as a component in enterprise, can securely connect us to our data around … Read more

From the Spring 2019 Issue

QKD versus PQC: A Quantum Showdown? Part 2

Author(s):

Hilary MacMillan, Vice President, Solutions Architecture, Secure Channels, Inc.

QKD versus RQC

This is part two of a two-part article on secure key distribution in a post-quantum world.  Part one focused on Quantum Key Distribution (QKD) as a method to securely distribute encryption keys.  This article will focus on Post-Quantum Cryptography (PQC), which seeks new quantum-resistant (i.e., hypothesized, but can’t be proven, to be secure against) cryptographic … Read more

From the Spring 2019 Issue

Programmable Networking: Solving the Security Challenges facing SD-WAN

Author(s):

Edward J. Wood, ,

programmable-network-header

Enterprises are moving their communications to the internet. Private networks are costly, inflexible, and do not easily enable the digital transformation of their businesses. However, over the last couple of years, we have seen a plethora of SD-WAN technologies come to market. Safe to say, SD-WAN adoption has accelerated. Unfortunately, SD-WAN has a number of … Read more

From the Spring 2019 Issue

Evolution of National Cyber Strategy in the United States

Author(s):

Eric Hipkins, Founder and Chief Executive Officer, R9B

“Everything in war is simple, but the simplest thing is difficult.” -Carl von Clausewitz What would the old Prussian general have to say about warfare in the 21st century? The wars of today, and certainly of tomorrow, may be readily understood as anything but simple. At least in comparison to the days of armies meeting … Read more

From the Spring 2019 Issue

Cybersecurity and Critical Infrastructure: A Growing Sense of Urgency Part 2

Author(s):

Audie Hittle, Chief Innovation Officer , Mystek Systems, Inc.

critical infrastructure sp19

Part II – Responding Faster to Threats Part II of this article will discuss mechanisms that can increase the speed with which responses to critical infrastructure threats can be executed. So what are some specific options and what can be done to implement a faster, more aggressive response to such cyber threats? One security approach … Read more

From the Spring 2019 Issue

Female Veterans–Ready to Fill Cybersecurity Jobs!

Author(s):

Dr. Amelia Estwick, Program Director, National Cybersecurity Institute at Excelsior College

Female Veterans

Current State of the Cybersecurity Industry Our nation’s robust cybersecurity industry will grow from $75 billion in 2015 to $170 billion by 20201. Additionally, the United States White House Administration’s 2019 budget has allocated approximately $15 billion in spending to fund critical initiatives and research in the cybersecurity space, up from $14.4 billion in 2018 … Read more