From the Summer 2018 Issue

BEARING THE BREACH: The Buzz About Cyber Insurance

Author(s):

Morgan Holmes, Commercial Property & Casualty Broker, Insurance Force

MH-Bearing-the-breach-heading

Is your data connection really safe? What happens if your secure Internet connection is not so secure? What are the chances of a breach happening to you? Would your company be able to recover from a data breach? No matter what your primary business market is or your company’s size, in today’s marketplace, electronic communications … Read more

From the Summer 2018 Issue

Value Chain Maps for Open Source Ecosystems

Author(s):

Chris Corriere, Senior DevOps Advocate, SJ Technologies

Open Source Concept-BigStock

We can’t make it from scratch anymore In his TED Talk, “How I built a toaster – from scratch”1, designer Thomas Thwaites demonstrates how our global society stands on the shoulders of giants. Thomas attempted to reverse-engineer a toaster so he could build one from scratch. However, the simplest toaster he could find had over … Read more

From the Summer 2018 Issue

TEOTWAWKI: The Impending Cryptopocalypse

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

AF-TEOTWAWKI-header

In 1889, the New York publisher John Wiley & Sons published an obscure scientific piece by Daniel S. Troy titled The Cosmic Law of Thermal Repulsion: An Essay Suggested by the Projection of a Comet’s Tail. On page 60 of this text, Troy suggests that if the forces of “thermal repulsion” or “gravitational attraction” were … Read more

From the Summer 2018 Issue

Moving Target Defense with Polymorphic Applications

Author(s):

Danny Gershman, Vice President, Security Operations, F9 Teams, Inc.

Danny Gershman Moving Target Defense

While the internet has existed for several decades, it’s only in recent years that security has become a popular concern. Cybersecurity tools and products now are a multi-billion dollar industry. Security engineers and executives continue to mitigate risk by trying to accurately quantify where their organizations might be vulnerable. Measuring security risk is hard. Typically, … Read more

From the Summer 2018 Issue

from the {Editor-in-Chief}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, It is time to take off the polarized cyberglasses, America, because what we choose not to see can kill us. The language of cybersecurity is laced with modal verbs and their auxiliaries such as “should,” “must,” and “ought to.” These words and phrases are used to express ability, possibility, permission, or obligation. They enable … Read more

From the Summer 2018 Issue

from the {Publisher}

Author(s):

Karen Austin, Publisher, United States Cybersecurity Magazine

Greetings, Welcome to the Summer 2018 issue of the United States Cybersecurity Magazine! As always, we’d like to take a moment to thank our supporters, members, sponsors, contributors and everyone else who makes the magazine possible. All of us here at the United States Cybersecurity Magazine are dedicated to bringing you, our readers, the best … Read more