From the Winter 2019 Issue

Irresistible Forces and Immovable Objects: When National Security and Cybersecurity Collide

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

AdamFirestone-feature-image-wn19

Security is inherently binary, like being alive or being married. Just as you can’t be “almost married” or “almost alive” (Schrodinger’s cat notwithstanding), you can’t be “mostly secure.”. There’s no way to create a solution that will permit compromise only by certain entities under certain carefully delineated circumstances while defeating all other malicious access attempts. … Read more

From the Winter 2019 Issue

The Art of the Feminine in a Masculine World of Cybersecurity

Author(s):

Jothi Dugar, C|CISO, CISSP, HCIPP, Author

JothiDugar-feature-image-wn19

The Psychology of Cybersecurity What is the psychology of cybersecurity, and the role that the Feminine (aka Women) play in it? Why is this important to understand? What does psychology have to do with cybersecurity you may wonder, and what do we mean by the Feminine? Cybersecurity is often miscategorized as predominantly a technical field, … Read more

From the Winter 2019 Issue

Ladies! Be the Energy in Cybersecurity

Author(s):

Diane M Janosek, Esq., CISSP, President, Women in Cybersecurity Mid-Atlantic Affiliate

Dianne-Janosek-feature-image-wn19

Did you know that women represent only eleven to fourteen percent of the cybersecurity workforce – and that there has been no real progress in increasing that percentage over the last two years? Women make up only eleven to fourteen percent of the cybersecurity workforce – hard to believe when you consider how many ladies … Read more

From the Winter 2019 Issue

Get into the Nitty Gritty Of Hybrid Cloud Management

Author(s):

Diana Vantur, Technology Analyst, TatvaSoft UK

Dianna Vantur feature image

IT managers can’t take their eyes off hybrid cloud management. Hybrid cloud is the latest technology fad. In a hybrid cloud implementation, enterprises creating a computing environment is a mix of capabilities deployed across both public and private clouds. Cloud computing has paid dividends in terms of increased productivity, cost reduction and easy scalability. Hybrid … Read more

From the Winter 2019 Issue

Orange is Not the New Black Hat

Author(s):

Griffin Weaver, Associate Attorney, USAA

Jason Edwards, Compliance Director - Cybersecurity, USAA

JasonEdwards-feature-image-wn19

As a cyber professional, the perks that come with working for a large company are many – new equipment, latest technology, big salary, and free soda, to name a few. However, one perk a company cannot offer, regardless of size, is a get out of jail free card for violations of the law. Just take … Read more

From the Winter 2019 Issue

Data Classification Business Process Changes Part 3 Conclusion

Author(s):

Bill Bonney, CISO Desk Reference Guide, CISO DRG Venture

BillBonney-feature-image-wn19

In the first article in this series, “Data Classification is the Key to Data Protection,” I asserted that “Data gains value from its use, not from being hidden and protected.” In the second article, “Data Classification That Honors Business Value,” I suggested that five new attributes be added to the standard five-tier (public, internal use … Read more

From the Winter 2019 Issue

Free Isn’t Always Best– It should come with a Big Caution Sign

Author(s):

MG (Ret) Quantock, , United States Army (Ret)

Quantock-feature-image-wn19

The free mapping in your phone is a powerful tool. And while it’s not designed to fire an artillery shell on a precision target, the app has all the basic features you need. So, why doesn’t the U.S. military ditch its expensive firing systems for free solutions? Because, while free products often have the features … Read more

From the Winter 2019 Issue

Cybersecurity and Critical Infrastructure: A Growing Sense of Urgency – Part 1

Author(s):

Audie Hittle, Chief Innovation Officer , Mystek Systems, Inc.

AudieHittle-feature-image-wn19

This two-part article examines risks and implications related to securing American critical infrastructure. Part I examines the historical framework and the current state of critical infrastructure protection. Part II discusses ways threat responses can be improved. What happens if one day you awake and discover the power had gone off during the night? You may … Read more

From the Winter 2019 Issue

QKD versus PQC: A Quantum Showdown? Part 1

Author(s):

Hilary MacMillan, Vice President, Solutions Architecture, Secure Channels, Inc.

HilaryMacMilan-feature-wn19

The need for communications confidentiality has existed since humans developed language. Accounts of the Greco-Persian wars in fifth century B.C. described steganography, (hiding the existence of a message). Cryptography, on the other hand, hides a message’s meaning. The cryptographic task of encryption enables a sender to “scramble” a message’s content, rendering it unreadable to anyone … Read more

From the Winter 2019 Issue

Evaluating the Operational Technology Environment: Improving DHSs Cybersecurity Evaluation Tool (CSET)

Author(s):

Henry J. Sienkiewicz, Author,

HenrySienkiewicz-feature-image-wn19

Servers, laptops, mobile devices, routers, industrial control systems, fire control systems, elevator operations, are the connected technology components of modern life that perform particular functions, offer ease of use, and that represent risks and vulnerabilities to an organization’s cyber environment. The cyber environment is tied to physical devices, including networking equipment, intrusion detection systems, data … Read more