From the Summer 2022 Issue

From the Editor-in-Chief

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, As long as I’m being honest, I might as well get this one off my chest:  Not only am I an unrepentant 80s metal-head, and one who’s convinced that music has only gone downhill since about 1988 (sorry, Rage Against the Machine fans), but of late, I’ve become convinced that much of what was … Read more

From the Summer 2022 Issue

From the Publisher

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Greetings, Welcome to the Summer 2022 issue of the United States Cybersecurity Magazine!   As always, we’d like to take a moment to thank our supporters, members, sponsors, contributors, and everyone else who makes the magazine possible.  All of us here at the United States Cybersecurity Magazine remain committed to bringing you, our readers, the … Read more

From the Summer 2022 Issue

Data Privacy: Regulations, Risks & Practicing Good Cybersecurity Hygiene

Author(s):

Mathew Scott, MCFE, Vice President, Equipment Consulting, J.S. Held

Introduction In a world that revolves around the collection and use of various forms of data, continuously assuring the  privacy of data being collected and stored is a major factor in cybersecurity hygiene, i.e. habitual practices for ensuring the safe handling of critical data and for securing networks. Managing the privacy of one’s data includes … Read more

From the Summer 2022 Issue

Enterprise IoT is Currently Extremely Inadequate – But it Doesn’t Have To Be

Author(s):

Brian Contos, Chief Security Officer, Phosphorus Cybersecurity

The state of Internet of Things (IoT) security across the enterprise and government agencies is shockingly bad. IoT devices are highly vulnerable; therefore, making organizations vulnerable. In many ways enterprise IoT security today is like IT security in the early 1990’s with poor asset inventories, limited patching, and weak credentials, which is to say, enterprise … Read more

From the Summer 2022 Issue

Strategic Cyber Compliance

Author(s):

Mike Shelah, Business Performance Advisor, Insperity

Strategic Cyber Compliance

In March of 2022, after attending a day long cyber conference at the local community college in Carroll County, Maryland,  the featured Keynote speaker for lunch was a risk management specialist, and he shared a brief and powerful story that will now be shared with you. A good friend of his is CIO for a … Read more

From the Summer 2022 Issue

Ukraine is Winning the Cyberwar Against Russia

Author(s):

Alex Haynes, CISO , IBS Software

Ukraine is Winning - Alex Haynes

During the build-up to the illegal invasion of Ukraine in February of 2022, there was consternation among information security professionals about what would happen on the cyber front. The prevailing groupthink at the time was that if countries in the West imposed sanctions, then they would suddenly be subjected to blistering Russian cyber-attacks that would … Read more

From the Summer 2022 Issue

Cybersecurity in the Alamo City: A Global Industry Leader

Author(s):

Jeff Fair, VP, Cybersecurity & Economic Development, San Antonio Chamber of Commerce

Nathan Ramon, Program Assistant, San Antonio Chamber of Commerce

Alamo City

San Antonio has a long history of technological innovation, which has set the course for the city to remain a leader in the cybersecurity industry for decades to come. A contributing factor to the area’s unique success stems from a longstanding military presence, infusing the region with innovators and a trained and ready workforce. Because … Read more

From the Summer 2022 Issue

Using Behavior Profiling to Identify Insider Threats – Part 1

Author(s):

Richard Benack, Principal Investigator, Hiperformance Security

Benack-Su22-feature

INTRODUCTION Organizations often spend significant time, effort and resources protecting their data and systems from external threats such as hackers, foreign spies, hacktivists, and cybercriminals. Internal threats, often called “insider threats”, are often ignored because they are much more challenging for an organization to address. One valuable tool for managing risk around insider threats is … Read more

From the Summer 2022 Issue

Cybersecurity in Banking and Financial Services Industry: Main Threats, Requirements, and Recommendations

Author(s):

Veniamin Simonov, Director of Product Management, NAKIVO

Simonov-Su22-feature

Finance is in the top 3 industries most frequently attacked by hackers, and for a good reason. Banks collect, store, and process personal information to serve clients, which can easily be misused when in the wrong hands. Consequently, a single data breach or loss incident can cost tens of millions of dollars (the Equifax data … Read more