Is the Cyber Kill Chain Model the Ultimate Solution to Rising Ransomware Attacks?

Author(s):

Waqas S, Cybersecurity Journalist, DontSpoof

Cyber Kill Chain Model

Ransomware attacks have long since been on a steady rise, wreaking havoc and destruction within the cybersecurity industry. Since the coronavirus pandemic in 2020, there has been a 148% rise in ransomware attacks.  The situation in 2021 was alarming as the number of attacks continued increasing. The year 2021 saw some of the worst ransomware … Read more

National Cyber Security Awareness Month

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

National Cyber Security Awareness Month, binary code particles and neon glowing cyber wave. in modern server room

Each October, National Cyber Security Awareness Month rolls around. Sponsored by the National Cyber Security Division, this month encourages us to approach our digital lives with awareness and caution. The NCSA takes time this month to reach out to Americans with tips for cyber hygiene. Additionally, the NCSA provides educational guides to online security. The … Read more

What is a Firewall and How Does it Work?

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Cords plugging into a system firewall

Firewalls have essentially been around since the beginning of the internet. A firewall is a network device designed to protect your system by monitoring and controlling information traffic based on a preset list of rules to ensure security. Firewalls establish a barrier of protection between a trusted network and a foreign network. They are one … Read more

6 Tips for Getting the Most out of Cybersecurity Conferences

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Man speaking at a conference on cybersecurity conferences

An important part of cybersecurity is plugging into the surrounding community. Connectivity is a major component of spreading new innovations. Many security professionals enjoy attending conferences for this very reason. But when attending cybersecurity conferences, it is important to get the most out of your interactions. Therefore, here are some tips to make sure you … Read more

Cloud Computing

Author(s):

Lauren Abshire, Director of Content Strategy, United States Cybersecurity Magazine

A cloud is raining information onto a hand holding a cell phone as a metaphor for Cloud Computing

The Cloud, what and where IS this cloud? This may be a question you have asked yourself. Simply, “cloud computing” is accessing and storing applications, data and information over the Internet, as opposed to…