From the Spring 2025 Issue

From the Publisher

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Greetings! Welcome to the Spring 2025 issue of the United States Cybersecurity Magazine!  As always, we’d like to take a moment to thank our supporters, members, sponsors, contributors, and everyone else who makes the magazine possible.  All of us here at the United States Cybersecurity Magazine remain committed to bringing you, our readers, the best … Read more

From the Spring 2025 Issue

From the Editor-in-Chief

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, It’s easy to get caught up in the chivalric vision of cybersecurity; it’s one that pervades the industry and has for…oh, well, ever.  More than a decade ago I attended a lavish cyber conference where the drinks (mine was an iced tea, in case Karen asks) were served on coasters in the conference organizer’s … Read more

From the Spring 2025 Issue

The Ever-Expanding Attack Surface: Urgent Need for Proactive Cybersecurity Strategies

Author(s):

Gaurav Sharma, Director of Operations, Chetu

The Ever-Expanding Attack Surface

The more doors and windows, the more opportunities a burglar has to break into your house. It is no different in the cyber realm, where hackers now have countless more entry points because of the digital transformation sweeping across businesses and industries. One of the primary drivers of the growing attack surface is the Internet … Read more

From the Spring 2025 Issue

Data Sovereignty: My House, My Rules – Maybe?

Author(s):

Justin Petitt, Director, Cybersecurity Center of Excellence, Edgewater Federal Solutions

Data Sovereignty

Data Sovereignty refers to the concept that data is subject to the laws and governance structures of the country in which said data is collected or stored, along with the policies of the organization holding or providing the data. With the increasing presence and utility of Artificial Intelligence, Large Language Models, and especially Cloud Computing, … Read more

From the Spring 2025 Issue

Human Rights and Their Controversy in the New International Convention Against Cybercrime

Author(s):

Claudia Da Costa Bonard de Carvalho, , CCBC Criminal Compliance Business School

Human Rights and Their Controversy in the New International Convention against Cyber Crime

Recently, the UN in New York approved the draft of a new treaty on cybercrimes, known as the Convention against the Use of New Technologies for Criminal Purposes[1]. This convention regulates issues from the previous Budapest Convention, now focusing on detailing international cooperation in combating cybercrime. The text of the proposal is fundamentally based on … Read more

From the Spring 2025 Issue

The More Things Stay the Same: The Resurgence of Classic Cyberattack Vectors

Author(s):

Chris Pogue, Director, Digital Forensics and Incident Response, CyberCX

Cyber Attack Vectors

In the ever-evolving landscape of cybersecurity, it’s easy to become fixated on emerging threats, often overlooking legacy vulnerabilities that persist within our systems.  Recent trends indicate a notable resurgence of classic attack vectors, such as SQL injections, buffer overflows, and web shells—techniques that many assumed had been relegated to the annals of cyber history. This … Read more

From the Spring 2025 Issue

Monitoring Your Supply Chain is as Hard as Ever

Author(s):

Alex Haynes, CISO , IBS Software

Monitoring Your Supply Chain

In today’s companies, the complex technology stack and a sprawling supply chain has become one of the most challenging tasks for organizations to manage. For CISOs and other security and compliance staff, the responsibility extends far beyond their internal networks and endpoints. It involves managing risk across dozens, if not hundreds, of external partners, vendors, … Read more

From the Spring 2025 Issue

Integrating Internet of Things (IoT) Devices

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

Integrating Internet of Things Devices

These devices, all of these little devices.  The integration of Internet of Things (IoT) devices into society’s fabric has been dramatic and rapid, revolutionizing industries and interactions.[1] Smart building management devices provide real-time data on energy usage, occupancy, and environmental conditions. Connected cameras, sensors, and access control systems offer comprehensive surveillance and monitoring, enabling swift … Read more

From the Spring 2025 Issue

On the Horizon: Top Five Security Trends for 2025 in Space & Cyber

Author(s):

Diane M Janosek, Ph.D., Esq., CISSP, CEO, JANOS LLC

Lt Col Marouane Balmakhtar, Ph.D., CISSP, Division Chief, United States Space Force

On the Horizon

Every day in the news there are novel space discoveries and increasingly successful launches of space assets.  On January 16, 2025, Blue Origin’s New Glenn rocket was successfully launched from Florida’s Cape Canaveral Space Force Station. In just 12.5 minutes, the New Glenn upper stage rocket reached orbit. This launch was significant because now Jeff … Read more