From the Winter 2015 Issue

Designing A Cybersecurity Solution: Security Reference Architectures

Author(s):

Dr. Eric Yocam, CRISC, CISSP, Adjunct Professor, University of Fairfax

Security reference architectures come in many flavors including industry-based, technology-based and enterprise-specific. When looking for some directional guidance when designing a cybersecurity solution, a cybersecurity professional can leverage the security reference architecture. The cybersecurity solution … Read more

From the Winter 2015 Issue

Seeing the Entire Elephant: Or,You’re Not Secure if You’re Not Completely Secure

Author(s):

Anne Kohnke, Assistant Professor of IT, Lawrence Technological University

Dan Shoemaker, Professor - Center for Cyber Security, University of Detroit Mercy

Almost everybody thinks, or would like to think, that the systems that power our society are secure. That would be a seriously incorrect assumption. The fact is that America’s electronic infrastructure is riddled with the … Read more

From the Winter 2015 Issue

Cybersecurity’s Three Great Lies – and Five Steps to Avoid the Threats They Enable

Author(s):

Christina Wiegand, Director of Commercial Services, TeleCommunication Systems (TCS) Cyber Intelligence Group

When hackers look for targets, they typically focus on big organizations because they’re the ones with the most credit cards, state secrets and other lucrative hauls, right? Wrong. As the widely reported Target credit card … Read more