Insider Threat – The Unseen Risk

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Giant shadow finger pointing at an employee who is an insider threat. Man is in a suit sitting at a desk on a chair. Grey background.

When it comes to threats in cybersecurity, the insider threat is not the first one that comes to mind. Malware, ransomware, hacking, and denial-of-service attacks dominate the headlines. But more often than not, an insider threat is the cause of many of these attacks. In fact, insider threats are responsible for around 43% of all data … Read more

Department of Defense (DOD) Cybersecurity Service Providers (CSSPs): A Unique Component of DOD’s Defense–in–Depth Strategy

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Business Woman Suit on Computer Cybersecurity DOD

An effective cybersecurity posture is achieved when there is confidence that information and information systems are protected against attacks through the application of security services in such areas as availability, integrity, authentication, confidentiality, and non-repudiation…

Network Integrity

Author(s):

Gary Merry, CEO, Deep Run Security Services, LLC

Cloud connecting to people in tech circles, network integrity

Network integrity starts with a network diagram. Actually, most things regarding technology risk should start with a network diagram. Your network is the circulatory, nervous and endocrine systems of your company. As such, it…