From the Summer 2022 Issue

Using Behavior Profiling to Identify Insider Threats – Part 1


Richard Benack, Principal Investigator, Hiperformance Security


INTRODUCTION Organizations often spend significant time, effort and resources protecting their data and systems from external threats such as hackers, foreign spies, hacktivists, and cybercriminals. Internal threats, often called “insider threats”, are often ignored because they are much more challenging for an organization to address. One valuable tool for managing risk around insider threats is … Read more

From the Spring 2022 Issue

Human Risk in the Flow of Work


Travis Good, MD, Co-Founder and CEO, Haekka

The way in which work is performed has changed dramatically over the last 20 years. Digital transformation, coupled with the transition to remote work, has only accelerated over the last several years with the backdrop of Covid. Organizations today, large and small, have the herculean mandate of securing their biggest liability — remote workers and … Read more

From the Fall 2020 Issue

Holistic Cybersecurity: The Human Element


Umang Doshi, Managing Partner, Business Development – Cybersecurity Strategy

Holistic Security

Digital technological advancements continue to occur at an unprecedented pace and, not coincidentally, the need to be cyber-secure has become more crucial. With each new application and device that otherwise seamlessly integrates into our personal and professional lives, so too does the opportunity for cybercriminals to infiltrate them. The extent of connectivity that we have … Read more

Mental Health and Cybersecurity


Frankie Wallace, ,

Mental health cybersecurity, girl sad, phone bad, girl on phone

Strong cybersecurity is vital, and the cybersecurity industry is evolving at a rapid pace. Still, even as more and more companies embrace cybersecurity professionals, a key aspect of this field remains overlooked: mental health. You might ask yourself what cybersecurity has to do with mental health. While acts like cyberbullying can obviously lead to negative … Read more

Employee Reporting


Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Employee Reporting boss yelling at employee business attire

As we have talked about before, insider threats are responsible for around 43% of all data breaches. Among these breaches, 21% of them are intentional, malicious, and premeditated. As more small businesses come under attack, anxiety within the work place is at an all-time high. When facing the threat landscape, it is important to remember … Read more

6 Tips for Getting the Most out of Cybersecurity Conferences


Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Man speaking at a conference on cybersecurity conferences

An important part of cybersecurity is plugging into the surrounding community. Connectivity is a major component of spreading new innovations. Many security professionals enjoy attending conferences for this very reason. But when attending cybersecurity conferences, it is important to get the most out of your interactions. Therefore, here are some tips to make sure you … Read more

From the Summer 2016 Issue

Cyber Hygiene: Not Just a Buzzword


Evan Dornbush, Co-Founder and CEO, Point3 Security, Inc.

On That Day, Everything Changed When Target Corporation was breached in 2013, leading to the loss of over 110 million customer records, it was following industry best practices to ensure that corporate assets were properly protected. It employed internal security practitioners. It outsourced niche services such as penetration testing and malware analysis to specialists. Its … Read more

From the Summer 2016 Issue

Education and Training for a Cybersecurity Cultural Change


Dr. Jane A. LeClair, President, Washington Center for Cybersecurity Research & Development

Nearly everyone in our digitized world is aware of the many cybersecurity challenges that we face. Hardly a week goes by without media coverage of a large or small organization, government agency, or private enterprise that has had its digital systems breached and data stolen. The list of attacked entities is long and well-known, from … Read more