In its ongoing pursuit of cyber excellence that maintains the U.S. Army Command, Control, Computers, Communications, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR) Center Cybersecurity Service Provider (CSSP), a trendsetter and premier leader for the advancement of Defensive Cyberspace Operations (DCO) within the Department of Defense (DOD), the C5ISR Center CSSP has attained International Organization for … Read more
Greetings, Welcome to the Winter 2022 issue of the United States Cybersecurity Magazine! As always, we’d like to take a moment to thank our supporters, members, sponsors, contributors and everyone else who makes the magazine possible. All of us here at the United States Cybersecurity Magazine remain committed to bringing you, our readers, the … Read more
Hello, Tell me that at least one of you out there in cyber land is a classic movie buff? And no, classic doesn’t mean something that was produced by Netflix for Netflix in 2018. Since I can hear the sound of that pin dropping , I’m forced to conclude that, once again… Lonely is the … Read more
The New Normal Working from Home (WFH) has been around for a long time. It wasn’t readily available to everyone and there were always whispers of “working from home” and what the employer thought it meant. Companies didn’t trust their employees if they couldn’t see them. You were often judged by the number of hours … Read more
WHY ASKING EMPLOYEES TO RETURN TO THE OFFICE IS MISSING THE MARK (AND HOW YOU CAN FIX IT) Neglecting to implement or continue a remote work option and reap its benefits can result in employees leaving an organization, possibly working for a competitor who does implement one. “If you do not allow flexible or remote … Read more
The need for user verification to prevent fraud and protect your company from cybercrime is increasingly being understood as urgent. Certain sectors, including eCommerce, banking and FinTech, recognized early on the importance of knowing exactly what company it is and who it is that wants to become a customer/client of theirs. Some local and regional … Read more
By now, data breaches are commonplace. Almost every day, there seems to be a new one—it has become a regular occurrence. Often, these breaches involve ransomware, which has become a much larger problem in recent years. Ransomware is concerning because it preys upon both Information Technology (IT) and Operational Technology (OT), which is disruptive to … Read more
Ransomware and other digital attacks continue to grow in frequency for companies around the world. With this, demand for cybersecurity services continues to grow as well. Services high in demand include professional services, pentesting, managed detection response, and more. It is, therefore, crucial to understand the innovation currently taking place in the cybersecurity sector. These … Read more
Effective cybersecurity management is imperative for all organizations. There are many standards and guidelines available for organizations to refer to in order to move forward. In this article, we will introduce specific action items based on well-defined frameworks and standards when building a Cybersecurity Management System (CSMS) for your own Industrial Control System (ICS). Taking a Defense-in-Depth (DiD) approach to network construction and choosing secure-by-design solutions from trusted vendors can help simplify the ICS cybersecurity decision-making process.
By 2026, what will the landscape of DevSecOps look like? How can organizations prepare for this future in the present? Before we can speculate on the future of DevSecOps, we must first consider how it came to be. Before DevSecOps, there was simply DevOps. The goal of DevOps was to allow the development and operations teams within an organization to work together as one cohesive unit, instead of two separate entities. The combination of these teams resulted in a decrease of time for both continuous integration and deployment (Rajapakse, Zahedi, Babar, & Shen, 2021). From the . . .