From the Summer 2023 Issue

Capturing The Sun: Solar and Cybersecurity

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

Thelonious K. Walker II, Alumnus, 2023, Georgetown University

Capturing the Sun

Burning mirrors. Since the seventh century BCE, man has tried to harness the power of the sun. Burning mirrors, magnifying glasses, were used to concentrate the sun’s rays.[1] These burning mirrors were positioned to focus sunlight onto a specific target. The concentrated heat was initially used to light fires; they eventually generated steam, heated fluids, … Read more

From the Summer 2023 Issue

Making Sense of CNAPP

Author(s):

Alex Haynes, CISO , IBS Software

Making Sense of CNAPP

Cloud Native Application Protection Platforms (CNAPP) are a new category of security tools that are designed to protect cloud-native applications. CNAPPs are a combination of functionality that comprise Cloud Security Posture Management (CSPM), Cloud Workload Protection Platform (CWPP), and Cloud Infrastructure Entitlement Management (CIEM). More recently they’ve integrated SAST (Static Application Security Testing) for workloads … Read more

From the Summer 2023 Issue

Next-Gen Devices Require Next-Gen R&D

Author(s):

Anthony Ricco, Chief Marketing Officer, Corellium

When we hear the term “IoT”, we immediately think of innovation, cutting edge, or a new way of doing things. We think about home automation, computer vision, smart watches, and driverless cars. When you stop to consider the endless ways IoT has modernized daily life and business, it’s pretty astounding. So why then is the … Read more

From the Summer 2023 Issue

Navigating the Environment of Zero Trust Architecture: How to Avoid Confusion and Begin Preparations

Author(s):

Lauren Beward, Senior Cybersecurity Specialist, ArCybr

For those who work in Department of Defense (DoD) and Government contracting, the term “Zero Trust Architecture” (ZTA) can be found everywhere, an oft-quoted buzzword that outlines the future of cybersecurity for our Nation’s networks and systems. So, what is ZTA really, and how will it affect security standards and processes in the future? This … Read more