From the Spring 2023 Issue

From the Editor-in-Chief

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, Imagine a world where a single factory produced 55% of the planet’s food supply and almost all of the nutritious foods that are required for children to develop into, and remain, vigorous, healthy, and productive adults with strong immune systems and sharp minds.  Putting this into perspective, the countries that represent the Organization of … Read more

From the Spring 2023 Issue

From the Publisher

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Greetings, Welcome to the Spring 2023 issue of the United States Cybersecurity Magazine!  As always, we’d like to take a moment to thank our supporters, members, sponsors, contributors, and everyone else who makes the magazine possible.  All of us here at the United States Cybersecurity Magazine remain committed to bringing you, our readers, the best … Read more

From the Spring 2023 Issue

Establishing A “Security First” Approach for IoT Devices No Matter the Industry

Author(s):

Thorsten Stremlau, Co-Chair of Trusted Computing Group Marketing Work Group | Systems Principle Architect at Nvidia, Trusted Computing Group

Across the globe, society has become increasingly dependent on digital technologies. By 2030, over 25.4 billion Internet of Things (IoT) devices are expected to play a crucial role in our daily lives. As a result, it is essential that developers adopt a ‘secure by design’ approach to ensure both device protection and integrity throughout any … Read more

From the Spring 2023 Issue

New and Improved ISO/IEC 27002: A Comprehensive Guide to Strengthen Cybersecurity and Data Protection

Author(s):

Dr. Michael C. Redmond, PhD, Founder and CEO, Redmond Worldwide

New and Improved ISO/IEC 27002

ISO/IEC 27002:2022 is an essential information security standard that helps organizations protect their data and assets. It provides a comprehensive set of guidelines and best practices to help ensure the Confidentiality, Integrity and Availability (CIA) of sensitive information. It outlines a strong framework for risk assessment and management, as well as robust operational security controls, … Read more

From the Spring 2023 Issue

Best Practices for Critical Infrastructure Security in Transportation

Author(s):

Krishna Chaitanya Tata, Senior Security Architect, Cisco Systems

Critical Infrastructure Security in Transportation

Introduction Critical Infrastructure (CI) has become the new battlefield in the complex geopolitics of the current times. Operational Technology (OT) is the new ‘crown jewels’ that rival nation states and rogue actors regularly target. The transportation sector is one such CI sector that continues to be a prime target for malicious cyber-attacks. In November 2022 … Read more

From the Spring 2023 Issue

Staying Cybersecure in 2023: Implementing Blockchain Technology

Author(s):

Joe Darrah, Freelance, Journalist

Stay Cybersecure in 2023

Cyberterrorism is a persistent, unrelenting threat to the security of any organization that utilizes the internet or any networked system today. Consider the attack launched on the United States Colonial Pipeline Company in May 2021 and the subsequent decision to pay the offenders $4 million in a ransom blackmail scheme in order to restore the … Read more

From the Spring 2023 Issue

High-Tech Layoffs and the Cybersecurity Risks that Result: The Need for a Holistic Approach

Author(s):

Glenn Axelrod, M.S, CISA, CISM, CRISC, HKA Technology Solutions, L.L.C.

In today’s fast-paced, technology-driven business landscape, high-tech layoffs and cybersecurity risks are two critical challenges that organizations must address. The COVID-19 pandemic has accelerated the shift towards automation and digitalization, leading to widespread job losses in various industries. At the same time, the increase in remote work and online transactions has led to a sharp … Read more

From the Spring 2023 Issue

An Overdue New Approach to a Generations-old Problem

Author(s):

Dan Richings, Senior Vice President, Global Presales and Solutions Engineering, Adaptiva

Endpoint Computing Security

The world is in a constant state of tumultuous change and in many cases uncertainty. This is particularly taxing on people whose job it is to manage the technology we all use to remain productive throughout the chaos. IT departments in enterprise organizations around the world are full of professionals who work much harder than … Read more

From the Spring 2023 Issue

Protecting Assets in the Cloud with Cloud Posture Security Management (CPSM)

Author(s):

Claus Nielsen, Chief Marketing Officer, Holm Security

CPSM

Cloud-based applications and services can quickly optimize operations for businesses across the globe. The downside to this is the unique challenge it brings to cybersecurity. With cloud security breaches becoming increasingly commonplace, any organization looking to secure the critical assets stored with one or more cloud service provider must look to utilize a Cloud Posture … Read more

From the Spring 2023 Issue

Ransomware Prevention by Pen Testing

Author(s):

Paul Kubler, Red Team Lead, CYBRI

Ransomware Prevention by Pen Testing

Ransomware continues to be a major problem for organizations and costs them a significant amount of money and time to remediate. Even if a company has the best external IT security in place, a single email attachment can lead to a breach. More and more organizations are learning from this and testing their environment by … Read more