From the Spring 2018 Issue

,

Aberdeen Proving Ground Speaks on Cybersecurity

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Feature image APG

  The trust put into any network is reliant on three main components: reliable hardware, strong software, and capable, aware people. Network trust, whether implicit or direct, is important for holding the fabric of any infrastructure together, especially during periods of distress or danger. The significant need for network trust especially applies to the cyber-realm, … Read more

From the Winter 2018 Issue

Can Your IT Systems Survive a CYBER ZOMBIE APOCALYPSE!

Author(s):

Christopher Grady, CTO, CyLogic, Inc.

CyLogic header image

Fundamental security controls you should implement this year; their widespread adoption would have prevented cybersecurity failures that made headlines over the past five years. Information System Security (INFOSEC) is a perception.  You can follow all the rules and best practices, implement the best technologies, check all of the boxes, and still get hacked.  While a … Read more

From the Fall 2017 Issue

LMI Practical Government Management For An Increasingly Complex World

Author(s):

George Berkheimer, Staff Reporter, United States Cybersecurity Magazine

Establishing a robust cybersecurity defense is no simple task for even the smallest of enterprises. The problems and challenges grow ever more difficult as the size and scope of systems requiring protection increases. The federal government, by comparison, represents perhaps the ultimate challenge with its complex structure of agencies. Each of these in turn has … Read more

From the Summer 2017 Issue

Penetration Testing Helps Federal Agencies Explore the Art of the Possible

Author(s):

George Berkheimer, Staff Reporter, United States Cybersecurity Magazine

In two separate cybersecurity attacks in recent years, hackers using stolen third-party vendor credentials managed to harvest debit and credit card information from 160 million combined Home Depot and Target customers. The retailers took a major hit to their reputations, not to mention their bottom lines: $300 million and counting for settlements, legal fees, customer … Read more

From the Spring 2017 Issue

CompTIA Trade Association Promotes Symbiotic Benefits For The IT Ecosystem

Author(s):

George Berkheimer, Staff Reporter, United States Cybersecurity Magazine

When five New York City area microcomputer dealers joined forces in 1982 to form the Association of Better Computer Dealers (ABCD), their idea was to find better ways to do business in the early days of the personal computer. ABCD began modestly, with a membership directory and vendor chats. In 1990, it changed its name, … Read more

From the Winter 2017 Issue

CyberUSA Building National Resilience

Author(s):

Staff Writer, , United States Cybersecurity Magazine

“It is imperative that American communities pull together on cybersecurity.” warns Tom Ridge, the nation’s first Secretary of Homeland Security and Chairman for the recently launched non-profit CyberUSA. “This is the new battlefront for both national security and economic security. That’s why we need to organize better nationally to get our private sector working together … Read more

From the Fall 2016 Issue

Counting Down from Zero

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

“Zero-day.”  The word is enough to strike fear into the hearts of even the most seasoned cyber-warriors. If a zero-day vulnerability has been uncovered in the system they’re supposed to be defending, all of their training and preparation, their work hardening the network to attacks, has been rendered null and void. There’s no point in … Read more

From the Summer 2016 Issue

Eyes on the Inside: Combating the Insider Threat

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

Jim Mazotas would never forget the call. His company was doing a vulnerability audit for a medium-sized university which suspected its admins of misconduct. The work had started on a Friday, and would continue for the entire weekend; he got the call on Sunday night. “[My team] said, ‘You need to come over here,’” Mazotas … Read more

From the Spring 2016 Issue

Information Security: THE CYBER CHESS CLUB

Author(s):

Cait von Schnetlage, MBA, CEO, Full Suite Solutions

Information security doesn’t start and end with business development experts and implementation specialists. It should have its roots within the foundations of a company, its core concept, and its leadership. Information security practices need to be built into all business processes, including how personnel communicate within the organization and externally with customers, vendors, and competition. … Read more

From the Winter 2016 Issue

Building a Cyber Lifecycle: The CyberTexas Foundation

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

The creation of a cyber warrior involves every element of an individual’s community: the schools that train them, the businesses that hire them, and the government that develops, enables, and protects the infrastructure necessary to sustain this evolution. But it’s not some neat assembly-line process, each budding cyber expert moving from school to work to … Read more