From the Summer 2014 Issue

It’s What’s Inside That Counts – The War From Within

Author(s):

Jim Mazotas, Founder, OnGuard Systems LLC

Larry Letow, President, COO, LG-TEK

“Tis not so deep as a well nor so wide as a church-door, but ‘tis enough, ‘twill suffice” — (Romeo and Juliet by William Shakespeare, Act III, Scene 1)  It is no surprise that with the continuing advancements in data mobility, increasing demands of regulatory compliance, and sharing amongst the global community, that securing our nations … Read more

From the Spring 2014 Issue

Focusing a Leader’s Lens on Cybersecurity Within a Vast Framework Landscape

Author(s):

Dr. Eric Yocam, CRISC, CISSP, Adjunct Professor, University of Fairfax

Cyber Threats Abound  When dealing with Cybersecurity, a leader must be vigilant and at a moment’s notice be able to evaluate his or her organization’s security posture in regards to cyber threats. Cyber threats are typically viewed from GRC perspectives including governance, risk and compliance but equally important perspectives include policy, value, service, program, and … Read more

From the Spring 2014 Issue

Reduce Risk, Train Your Workforce

Author(s):

Michael Volk, Cybersecurity Specialist, PSA Insurance & Financial Services

The threat landscape in the cyber domain has changed. A secure perimeter comprised of traditional network security devices, technologies and mechanisms is necessary but it is no longer sufficient to defend against the threats that exist in the current environment. The proliferation of Advanced Persistent Threats (APTs) executed by sophisticated adversaries has changed the cybersecurity … Read more

From the Spring 2014 Issue

Commercial Off-The-Shelf (COTS) vs. Home-Grown Software

Author(s):

John Scillieri, , Visionist, Inc.

Matthew Loff, , Visionist, Inc.

Which is more secure for your small business?  Introduction  You’ve reached a growing pain many small business owners are familiar with. As your company expanded, employees relied on free email and file sharing services, and you were content with keeping timecards and expense reports in spreadsheets. This worked well enough when you had 5 employees, … Read more