From the Summer 2014 Issue

Above the Noise Floor: Security Measures in Your Network

Author(s):

Marc Milligan, Cyber Threat Analyst, Visionist, Inc.

In network security, a noise floor is a baseline or an acceptable percentage of false positives (when the system cries wolf) and false negatives (when it misses an actual security event) from your security products. No monitoring solution is fool proof, so you will need to develop a method of sorting out the good, the … Read more

From the Summer 2014 Issue

Implementing Continuous Monitoring to Combat the Nation’s Cyber Threat

Author(s):

Matt Brown, Vice President, Homeland Security and Cyber Solutions Knowledge Consulting Group (KCG)

Cyber attacks on federal government systems are increasing in volume, vigor and complexity. In fiscal 2012 alone, there were 48,562 cybersecurity incidents at federal agencies reported to the U.S. Computer Emergency Readiness Team (US-CERT), a division of the Department of Homeland Security’s National Cybersecurity and Communications Integration Center (NCCIC). That’s a 782 percent increase over … Read more

From the Summer 2014 Issue

It’s What’s Inside That Counts – The War From Within

Author(s):

Jim Mazotas, Founder, OnGuard Systems LLC

Larry Letow, Operating Partner, Interprise Partners, Executive Vice President, Myriddian LLC

“Tis not so deep as a well nor so wide as a church-door, but ‘tis enough, ‘twill suffice” — (Romeo and Juliet by William Shakespeare, Act III, Scene 1)  It is no surprise that with the continuing advancements in data mobility, increasing demands of regulatory compliance, and sharing amongst the global community, that securing our nations … Read more

From the Summer 2014 Issue

from the{PUBLISHER}

Author(s):

Karen Austin, Publisher, United States Cybersecurity Magazine

Greetings and Welcome!   In this 21st Century digital world we live in, the cold-calloused cybercriminals, yes, our enemies, continue to commit credit theft, identity theft, extortion. Right here in the United States of America. Through social media, the cybercriminal offenders are preying on our children and teens. Our children are being exploited. Human trafficking … Read more