From the Summer 2017 Issue

Building Resilience in an End-to-End Encryption World

Author(s):

Ed Alcantara, Chief Cyber Intelligence Officer, BLACKOPS Cyber

It can be argued that strong end-to-end encryption has been responsible for the trust that enables the internet economy that has revolutionized the way commerce is conducted, created tremendous wealth and enabled the spontaneous generation of knowledge economies across the world. Unfortunately, the same encryption technologies have created great difficulties for the law enforcement and … Read more

From the Summer 2017 Issue

REVOLUTION and EVOLUTION: Fully Homomorphic Encryption

Author(s):

David W. Archer, PhD, Principal Scientist, Galois, Inc.

More and more computation is being outsourced to public clouds. Cloud computers can be just as vulnerable as any other computer, putting the privacy of sensitive data at risk. As nation-state cyber weapons become increasingly available to amateur and low-level professional cyber criminals, the external threats against those cloud-based systems continue to grow. In addition, … Read more

From the Summer 2017 Issue

Opting in to Cyber Vulnerability

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Weak Nations, Asymmetric Warfare and Power Projection America’s rivals routinely employ offensive cyber operations to influence American actions and policy.  Despite claims made by pundits and the press, these are not powerful countries, and their reliance on cyber operations and asymmetric warfare betrays them as weak players on the international stage, unable to project power … Read more

From the Summer 2017 Issue

from the {EDITOR-IN-CHIEF}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

adam-firestone

Hello, If we were crying out for tangible evidence of the cost of cyber insecurity, we’d need to look no further than the headlines. (It’s always in the headlines!) On August 7th, attackers posted a video ransom note demanding $7.5 million in return for stolen HBO intellectual property. It seems that the good guys just … Read more

From the Summer 2017 Issue

from the {PUBLISHER}

Author(s):

Karen Austin, Publisher, United States Cybersecurity Magazine

Karen Austin

Greetings, Welcome to the Summer 2017 issue of the United States Cybersecurity Magazine.   As always, I would like to thank our sponsors, members and contributors for the continued support that makes the magazine possible.  Next, it’s important to acknowledge the United States Cybersecurity Magazine staff for their dedication and hard work in producing a high-quality, … Read more