Skip to content

Menu

United States Cybersecurity Magazine
United States Cybersecurity Magazine
  • Home
  • Magazine
  • Cybersecurity Channels
    • MSSP Services – CISPOINT
    • Security Testing – Corellium
    • Security Software & Services – Wind River
    • Darknet Intelligence – BOC INTEL
  • Cyber Daily
  • Calendar
  • Resources
Welcome! | Subscribe | Sign In
United States Cybersecurity Magazine
  • Home
  • Magazine
  • Cybersecurity Channels
    • MSSP Services – CISPOINT
    • Security Testing – Corellium
    • Security Software & Services – Wind River
    • Darknet Intelligence – BOC INTEL
  • Cyber Daily
  • Calendar
  • Resources
  • Subscribe
  • Sign In

Issue: Summer 2017

From the Summer 2017 Issue

Commentary

Security for College Freshmen

Author(s):

Christopher Cerne, , Focal Point Technologies

INTRODUCTION  Graduating high school and attending college is a huge step for many students that grants new independence. Before starting the fall semester, many have already been briefed about the don’ts of living on campus: … Read more

From the Summer 2017 Issue

Training and Workforce Development

Passport to the Future: A Secondary School Cyber Education Case Study

Author(s):

Owen Haiber, Student,

Steve Morrill, CIO & Director of Cyber Science, Loyola Blakefield

Developing and maintaining a cyber-capable workforce is a significant challenge for the United States. Currently, a significant gap exists between the demand for skilled cybersecurity professionals and the number of such people being produced by … Read more

From the Summer 2017 Issue

Training and Workforce Development

Developing Cybersecurity Leadership – From Art to SCIENCE

Author(s):

Sallie Sweeney, Director/Tech Enablement, KPMG

Finding cyber leaders who have the right amount of technical depth, strength of character, dedication to the mission, and loyalty to the team is like finding a needle in a haystack. Traditional leadership development curricula … Read more

From the Summer 2017 Issue

Training and Workforce Development

Is There A Cybersecurity Labor Shortage or Vision Deficit?

Author(s):

Gary Merry, CEO, Deep Run Security Services, LLC

To understand the status of cybersecurity today, think of it as a young mountain that has formed atop the tectonics of business and technology. The mountain has grown explosively, pushed by the upwelling of industry … Read more

From the Summer 2017 Issue

Industry & Business Best Practices

REAL TALK: Protecting Personal and Company IP from Cybercriminals

Author(s):

Gregg Smith, CEO, Silent Circle

Device Atlas, the world’s most authoritative source on device data, states that there were 2.6 billion smartphones and over 4 billion mobile phone users in the world in 2016. This number is expected to double … Read more

From the Summer 2017 Issue

Industry & Business Best Practices

A Case for Collaboration

Author(s):

Chris Castaldo, Senior Director of Information Security, 2U

In my many years of working in cybersecurity, I’ve found the only thing that can truly secure an organization is collaboration. The most important part of “people, process, technology” is the people. No one in … Read more

From the Summer 2017 Issue

Featured Article

Penetration Testing Helps Federal Agencies Explore the Art of the Possible

Author(s):

George Berkheimer, Staff Reporter, United States Cybersecurity Magazine

In two separate cybersecurity attacks in recent years, hackers using stolen third-party vendor credentials managed to harvest debit and credit card information from 160 million combined Home Depot and Target customers. The retailers took a … Read more

From the Summer 2017 Issue

Engineering and Vulnerability Management

SOFTWARE DEFINED NETWORKING’S (SDN) IMPACT ON CYBERSECURITY

Author(s):

Henry J. Sienkiewicz, Faculty, Former CIO, DISA, Georgetown and George Washington Universities

Our connected world has changed expectations and requirements. Only a short time ago, a mobile phone connected to an enterprise application would have been unimaginable. The network could not support it. Security would not allow … Read more

From the Summer 2017 Issue

Engineering and Vulnerability Management

Web Application Security: Integration or Extinction

Author(s):

Helen Korobko, Vice President of Technology Solutions, Svitla Systems

Web applications have become a primary vulnerability for modern business  Today, almost every enterprise produces, leverages, transacts business or depends upon web or Cloud enabled software. As a result, web applications have become the number … Read more

From the Summer 2017 Issue

Engineering and Vulnerability Management

Building Resilience in an End-to-End Encryption World

Author(s):

Ed Alcantara, Chief Cyber Intelligence Officer, BLACKOPS Cyber

It can be argued that strong end-to-end encryption has been responsible for the trust that enables the internet economy that has revolutionized the way commerce is conducted, created tremendous wealth and enabled the spontaneous generation … Read more

Older posts
Page1 Page2 Next →
START READING

TABLE OF CONTENTS

United States Cybersecurity Magazine
  • from the {PUBLISHER}
  • from the {EDITOR-IN-CHIEF}
Cybersecurity Policy
  • Opting in to Cyber Vulnerability
Engineering and Vulnerability Management
  • REVOLUTION and EVOLUTION: Fully Homomorphic Encryption
  • Building Resilience in an End-to-End Encryption World
  • Web Application Security: Integration or Extinction
  • SOFTWARE DEFINED NETWORKING’S (SDN) IMPACT ON CYBERSECURITY
Featured Article
  • Penetration Testing Helps Federal Agencies Explore the Art of the Possible
Industry & Business Best Practices
  • A Case for Collaboration
  • REAL TALK: Protecting Personal and Company IP from Cybercriminals
Training and Workforce Development
  • Is There A Cybersecurity Labor Shortage or Vision Deficit?
  • Developing Cybersecurity Leadership – From Art to SCIENCE
  • Passport to the Future: A Secondary School Cyber Education Case Study
Commentary
  • Security for College Freshmen

ISSUE INDEX

SUBSCRIBE TO OUR CYBERSECURITY COMMUNITY

Subscribe today for free and gain full access to the
United States Cybersecurity Magazine and its archives. In addition, via our newsletter, you will hear from cybersecurity subject matter experts, and will be notified of the release of the next issue of the magazine!

SUBSCRIBE NOW

US CyberSecurity Magazine

  • Subscribe
  • Log In
  • Home
  • Magazine
  • Cybersecurity Channels
    • ArCybr
    • Security Testing – Corellium
    • Security Software & Services – Wind River
    • BOC INTEL
  • Contact Us
  • About
  • Cyber Daily
  • Calendar
  • Resources
  • Advertise With Us
  • Write for Us
  • Privacy Policy
Facebook-f Linkedin-in X Instagram Wordpress

© 2026 American Publishing, LLC™ | 17 Hoff Court, Suite B • Baltimore, MD 21221 | Phone: 443-231-7438
  • Subscribe
  • Log In
  • Home
  • Magazine
  • Cybersecurity Channels
    • ArCybr
    • Security Testing – Corellium
    • Security Software & Services – Wind River
    • BOC INTEL
  • Contact Us
  • About
  • Cyber Daily
  • Calendar
  • Resources
  • Advertise With Us
  • Write for Us
  • Privacy Policy
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
Powered by CookieYes Logo