From the Fall 2022 Issue

Five Ways to Solve the Cybersecurity Skills Gap

Author(s):

Jayant Kripalani, Consulting Sales Engineer - Security, Splunk

Five Ways to Solve the Cybersecurity Skills Gap

An effective cybersecurity strategy encompasses an organization’s people, processes, and technology. While processes and technology are in a constant state of iteration and improvement, hiring and retaining talented people in cybersecurity roles has been an issue for at least a decade—and it’s getting worse. Information Systems Security Association International (ISSA) reports that in 2021, more … Read more

From the Fall 2022 Issue

7 Reasons to Deploy Continuous Identity Confirmation Technology in Your VDI Environment

Author(s):

Paul Baker, Director of Channel Sales, Plurilock Security, Inc.

CICT in VDI Feature

Many organizations have accelerated the adoption of Virtual Desktop Infrastructure (VDI) in light of changing work strategies. However, how can you confirm that the user remotely signed in to a virtual desktop is the authorized user rather than a stranger in possession of a stolen session or stolen credentials? This article will look at the … Read more

,

How to Become a SOC Analyst

Author(s):

Glenn Mabry, Senior Instructor/Security Researcher, Advanced Security

How to Become a SOC Analyst

A Security Operations Center, or SOC, is one of the most important departments for any modern business. It is here that the organization’s cybersecurity team does their job, monitoring and analyzing their security networks in case of bad actors or other cyber-attacks. Working in a SOC can be extremely exciting, but the journey to that … Read more

From the Winter 2021 Issue

Cybercriminals Don’t Need to Steal Mass Amounts of Personal Data Anymore and That’s a Big Challenge for Cybersecurity Teams

Author(s):

James Everett Lee, Chief Operating Officer, The Identity Theft Resource Center

stealing Data

For at least the past 15 years, a primary goal of cybersecurity teams was to block threat actors from gaining access to the growing amount of personal information collected about consumers. Meanwhile, threat actors focused on a never-ending quest to hoover-up as much consumer personal information as possible to convert to cash. Over time, technology … Read more

Cybersecurity Career

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Dark Lit Two Men Cybersecurity Career Engineer Lab

Cybersecurity is a growing threat. Last year, we saw 143 million Americans lost their personal, sensitive information in an Equifax data breach. This year, we saw Facebook allow our personal information to be mined by third party company without our consent or knowledge. In the year of 2016, the US. Bureau of Labor Statistics (BLS) claimed that … Read more

From the Summer 2015 Issue

Growing the Silver Bullet

Author(s):

Chris Cook, Associate Director, CyberTexas

If America is ever able to adequately address today’s modern cybersecurity threats, it will mean that someone has discovered the “silver bullet” or, more realistically, that we’ve grown the workforce needed to successfully address the problem of a critical shortage of trained cybersecurity professionals.  San Antonio’s educational, governmental, and industrial institutions have taken a comprehensive … Read more

From the Summer 2015 Issue

Looking under the Hood of Cybersecurity Education

Author(s):

Dr. Jane A. LeClair, President, Washington Center for Cybersecurity Research & Development

James L. Antonakos, Fellow, National Cybersecurity Institute at Excelsior College

Students in a computer security class are often taught about a new concept by action rather than explanation. By taking the actions they’re taught, they are actually part of the security solution, not just observers of a process. This also adds to their sense of accomplishment, since they are responsible for the outcome of the … Read more

From the Summer 2015 Issue

America’s Cyber Warriors: Appropriate Training at the Forefront

Author(s):

Paul de Souza, CSFI-CWD (Cyber Warfare Division) Founder Director, Military Cyber Professionals Association (MCPA)

Professor William Butler, Cyber Security Program Chair, Capitol Technology University

Warrior: A man (or woman) engaged  or experienced in warfare;  broadly: a person engaged in some struggle or conflict.1 There are many challenges in building and developing a cyber army, from the senior leadership to the technical workforce. The term “Cyber Warrior” is being used by the media and throughout the Department of Defense to … Read more