From the Winter 2022 Issue

Stop Being Cyber Stupid

Author(s):

Mike Shelah, Business Performance Advisor, Insperity

It is not a huge revelation, when they say hacks and ransomware have gone through the roof since July of 2020. Cyber-attacks are impacting every business, in every industry. Just because you weren’t hacked does not mean it did not have a ripple effect on you. The Target breach that occurred a few years ago … Read more

From the Winter 2022 Issue

Countering New Cyber Vulnerabilities Being Faced by Remote Workers

Author(s):

Dr. Bill Anderson, President, CIS Mobile

Before “COVID” became part of our daily lexicon, only seven percent of U.S. workers had access to a flexible workplace or telework, according to a report by the Pew Research Center. Today, all of that has changed. Nearly half of the American workforce is working remotely – a trend most employers expect will continue and … Read more

From the Winter 2022 Issue

Cybersecurity is Key in a 5G World: Here’s Why

Author(s):

Daniel DeBaun, CEO/Co-founder, DefenderShield

By now, everyone has heard of 5G and all of the amazing benefits that will come with the newest wireless cellular network: insane data speeds, better Internet experiences, an upgraded Internet of Things (IoT), and a new level of connectivity between virtually everyone and everything including devices, machines, and objects. There’s no doubt that the … Read more

From the Winter 2022 Issue

The Machine Industry and Control Systems: The National Security Risks with SCADA

Author(s):

Alan Cunningham, Independent Journalist, Truth Be Told

Alan-Cunningham

With any technological system, it can be susceptible to cyber-attacks or hacking measures by foreign or domestic actors for varying purposes. Within the United States, we have seen a large municipal city resort to pen and paper for daily tasks after a Ransomware attack, a breach of federal personnel information by hackers contracted by a … Read more

From the Winter 2022 Issue

Cybersecurity in the Information Environment

Author(s):

Jack Koons, Author,

Today’s cybersecurity is much more than simply a conversation about information technology, operational technology, and data protection. It’s a world of maneuver inside and across the cognitive, virtual, and physical space – the information environment. Today’s security professionals must become comfortable with operating and defending across all three layers, as well as the impact and … Read more

From the Winter 2022 Issue

Cyber in Hybrid Threats – Acute and Present Danger to Our Society

Author(s):

Carmen Marsh, President and CEO, United Cybersecurity Alliance

Håkan Gunneriusson, Docent War Studies, Mid-Sweden University, Risk and Crisis Centre/Political Science

Josef Schroefl, Deputy Director, COI Strategy and Defence, Hybrid CoE

Madeleine Myatt, Doctoral Researcher/Research Fellow, University of Bielefeld, Germany

Cyber in Hybrid Threats

“The power of cyber in hybrid conflicts” was a hot topic at the recent European Centre of Excellence for Countering Hybrid Threats (Hybrid CoE) – “Cyber Power Symposium 2021” in Helsinki, Finland on November 10, 2021. This exclusive symposium brought together international experts to discuss critical subjects and share their insights about ways to counter … Read more

From the Winter 2022 Issue

How to Reduce the Risk of Cyber-Attacks on Global Supply Chains

Author(s):

Amy Nelson, Chair of TCG’s PC Client Work Group, Trusted Computing Group (TCG)

The number of cyber-attacks attempting to compromise global industry supply chains are on the rise, and a new survey by BlueVoyant found that 97 percent of global firms have been impacted by a cybersecurity breach in their supply chain in the past 12 months. Not only that, but 95 percent of respondents said their organizations … Read more

From the Winter 2022 Issue

Going Beyond the Motion(s) of Cybersecurity

Author(s):

Malcolm Harkins, Chief Security and Trust Officer, Epiphany Systems

Malcolm Harkins - Cyber Risk - Going Beyond the Motion(s) of Cybersecurity

Speed, Velocity, and Acceleration. The physics of motion are well documented, and we understand how these scalar and vector quantities differ. In information security and cyber risk management the dynamics are not as well understood which has confused our ability to distinguish between motion and progress. This confusion intensifies our escalating risk cycle by causing … Read more

From the Winter 2022 Issue

Is Zero Trust Set Up to Fail?

Author(s):

Bob Gilbert, VP, Security Cloud GTM Strategy and Chief Evangelist, Netskope

Why Data Context is Key to Successful Zero Trust Implementations The nature of business today is increasingly decentralized. Cloud applications are exploding; data is everywhere. And a large number of users will continue to work remotely even post-COVID-19. While all of these things increase business agility, they also increase an organization’s attack surface. The concept … Read more