From the Spring 2024 Issue

From the Publisher

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Greetings! Welcome to the Spring 2024 issue of the United States Cybersecurity Magazine!  As always, we would like to take a moment to thank our supporters, members, sponsors, contributors, and everyone else who makes the magazine possible.  All of us here at the United States Cybersecurity Magazine remain committed to bringing you, our readers, the … Read more

From the Spring 2024 Issue

Brown Paper Packages Tied Up With Cyber – the Consumer Package Goods Industry and Cybersecurity

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

introduction A doorbell rings, a text message arrives- a package has been delivered to a front porch or loading dock. The Consumer Packaged Goods (CPG) industry delivers a wide range of products sold to consumers – safely, reliably, and routinely – from grocery stores to department stores. The CPG industry comprises businesses involved in producing, … Read more

From the Spring 2024 Issue

From the Editor-in-Chief

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, I have a well-researched theory that (OK, well-researched by me, and since this is my column…you get the picture) that most cybersecurity wisdom stems from 1970’s punk rock.  For example, in 1977, Joey Ramone graced us with this observation, which was philosophical, pithy, and deeply insightful all at once: I don’t care (he don’t … Read more

From the Spring 2024 Issue

Microsegmentation’s Role in Compliance: Meeting Regulatory Requirements

Author(s):

Larry Letow, CEO, U.S., CyberCX

Microsegmentation's Role in Compliance

Introduction In today’s interconnected world, regulatory compliance has become a top priority for organizations across various industries. Businesses must adhere to an ever-growing list of laws and regulations designed to protect sensitive data and maintain the security and privacy of customers and stakeholders. One crucial technology that has emerged to assist organizations in achieving regulatory … Read more

From the Spring 2024 Issue

Shielding Projects: Cybersecurity Strategies for PMOs

Author(s):

Rahul Yadav, Founder & CEO, Feasti

In this digital era, organizations face cyber threats with severe consequences. These threats are primarily due to remote working, the usage of unsecured devices or the use of outdated antivirus software. An effective cybersecurity strategy involves risk assessment for effective resource allocation. Moreover, security systems such as encryptions and firewall software stop unauthorized access. Project … Read more

From the Spring 2024 Issue

The Evolving Dynamics of Product and Operational Technology Security Within the Semiconductor Industry

Author(s):

Krishna Chaitanya Tata, Operational Technology Cybersecurity Leader, IBM

Krishna Tata-Spring 2024

Introduction Security within products is the need of the hour across manufacturing organizations, more so within semiconductor manufacturing. Secure by Design is an imperative that organizations are adopting very rapidly. This is very critical for the manufacturing industry as it is the most targeted industry for cybersecurity attacks in the last year. The graphic below … Read more

From the Spring 2024 Issue

What’s Next for CMMC 2.0?

Author(s):

John Kerber, Cybersecurity Assessor, ArCybr

Lauren Beward, Senior Cybersecurity Specialist/ Business Development Manager, ArCybr

What's Next for CMMC 2.0?

How to Ready Your Organization for Forthcoming Implementation Since 2020, the Defense Industrial Base (DIB) has waited for the implementation of the Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC) program anxiously wondering what it means for the contracting community and the future of defense acquisitions.  CMMC will begin implementation by January 2025, so … Read more

From the Spring 2024 Issue

Cracking the Code: Leveraging Deep Learning to Revolutionize Cyber Threat Intelligence

Author(s):

Gaurav Sharma, Director of Operations, Chetu

Cracking the Code: Leveraging Deep Learning to Revolutionize Cyber Threat Intelligence

Hackers and nation-state cybercriminals pose a growing threat to the security of our digital world. No one, from individuals to multi-national corporations to governments, is immune from cyberattacks like data breaches, ransomware attacks, and targeted intrusions. The World Economic Forum’s Global Risks Report for 2024 ranks cyberattacks as a top five global risk, right after … Read more

From the Spring 2024 Issue

Shannon’s Dilemma: Securing a Future We Control but Cannot Know

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

The general sat back in her high-backed executive office chair and surveyed the network operations center.  A half-dozen engineers focused intently on the large curved high-definition displays in front of them and two men stood to her right. She nodded to the government program manager.  “Have we gotten all the necessary approvals?”  She knew the … Read more

From the Spring 2024 Issue

Digital Twins: Mirroring Business, Mirroring Cybersecurity Risks

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

Digital Twins

A digital twin is a virtual representation of a physical object, process, or system. Digital twins have emerged as a critical technology that fundamentally changes how companies design, monitor, and maintain their physical assets in today’s rapidly evolving industrial landscape. A digital twin is a virtual representation of a physical object, process, or system. Often … Read more