From the Winter 2020 Issue

ARE WE TRYING TO OUT-“SMART” OURSELVES?

Author(s):

Justin Petitt, Director of Cybersecurity, Systems Engineering Solutions Corporation

Larry Letow, Operating Partner, Interprise Partners, Executive Vice President, Myriddian LLC

smart cyber society

Not all that long ago, “Cyber” was a word that acted as a placeholder, standing in the place of super-specialized knowledge set and complex systems better left to experts. Cyber was too far removed from the day-to-day for the average person when personal records, bills, bank statements, health records and more were handled by paper. … Read more

From the Winter 2019 Issue

Irresistible Forces and Immovable Objects: When National Security and Cybersecurity Collide

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

AdamFirestone-feature-image-wn19

Security is inherently binary, like being alive or being married. Just as you can’t be “almost married” or “almost alive” (Schrodinger’s cat notwithstanding), you can’t be “mostly secure.”. There’s no way to create a solution that will permit compromise only by certain entities under certain carefully delineated circumstances while defeating all other malicious access attempts. … Read more

From the Summer 2018 Issue

It’s Time for Digital Health and Hygiene

Author(s):

Hilary MacMillan, Vice President, Solutions Architecture, Secure Channels, Inc.

digital-hygiene-header

Physical health and hygiene education in primary and secondary schools is taken as a given now, but it wasn’t always so. It was not until 1840 that Rhode Island legislation made health education mandatory.1 The 1850 publication by school teacher Lemuel Shattuck, of the Report of a General Plan for the Promotion of Public and … Read more

From the Summer 2018 Issue

National Cybersecurity Center of Excellence

Author(s):

William C. Barker, NIST Guest Researcher, Dakota Consulting

wbarker-header

American information infrastructure is subject to continuous attack by malicious actors. The national security and economic consequences of these threats have motivated the national security community to develop a set of cybersecurity policies and supporting technologies. Many of these initiatives have been led by the National Security Agency, U.S. Cyber Command, the Defense Information Systems … Read more

From the Winter 2018 Issue

A (Very) Brief History of Pre-Computer Cryptography, Part 1

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

A brief History header image

This is the first part of a two-part article exploring the history of pre-computer cryptography.  Part 1 will focus on the period from the birth of cryptography some 4,000 years ago to the development of early transposition and substitution ciphers.  Part 2 looks at the emergence of cryptanalysis under the Abbasid Caliphate and goes through … Read more

From the Fall 2017 Issue

WHAT THE HASH? Data Integrity and Authenticity in American Jurisprudence

Author(s):

Hilary MacMillan, Vice President, Solutions Architecture, Secure Channels, Inc.

Legal battles over compulsory data decryption are making headlines. The publicity will likely continue as encryption technology proliferates in both consumer and enterprise markets. The arguments on both sides of this issue merit careful consideration and discourse before any comprehensive policy decision is made or legal precedent is set. One side argues that alternate decryption … Read more

From the Summer 2017 Issue

Security for College Freshmen

Author(s):

Christopher Cerne, , Focal Point Technologies

INTRODUCTION  Graduating high school and attending college is a huge step for many students that grants new independence. Before starting the fall semester, many have already been briefed about the don’ts of living on campus: don’t do drugs, don’t fail classes and don’t do anything stupid. Unfortunately, there’s an important topic that’s often neglected: Internet … Read more