From the Winter 2026 Issue

The Future Belongs to the Secure: Using CMMC to Build Trust and Differentiate Your Brand

Author(s):

Jacqui Magnes, CEO and Owner, COMSO, Inc. dba CISPOINT

In the high-stakes world of government contracting, the race isn’t just to the most qualified bidder anymore, it’s to the most secure. As we move into 2026 and prepare for the full implementation of CMMC 2.0, the question for every defense contractor isn’t “How do I pass the audit?” but rather “How do I lead … Read more

From the Fall 2025 Issue

From Computer Security Incident Response Team (CSIRT) to Cybersecurity Service Provider (CSSP)

Author(s):

-Zemma Chachu, Program Manager, Leidos

Cesar Pie, Strategist, CSIOS

The 30 Year Journey of the U.S. Army’s C5ISR (Command, Control, Communication, Computers, Cyber, Intelligence, Surveillance and Reconnaissance) Center CSSP Since 1996, the C5ISR Center CSSP has cemented its position as one of the top Federal CSSPs protecting and defending a portion of the Department of War (DoW) cyberspace domain. In recognition of its upcoming … Read more

From the Spring 2018 Issue

,

Aberdeen Proving Ground Speaks on Cybersecurity

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Feature image APG

  The trust put into any network is reliant on three main components: reliable hardware, strong software, and capable, aware people. Network trust, whether implicit or direct, is important for holding the fabric of any infrastructure together, especially during periods of distress or danger. The significant need for network trust especially applies to the cyber-realm, … Read more

From the Winter 2018 Issue

Can Your IT Systems Survive a CYBER ZOMBIE APOCALYPSE!

Author(s):

Christopher Grady, CTO, CyLogic, Inc.

CyLogic header image

Fundamental security controls you should implement this year; their widespread adoption would have prevented cybersecurity failures that made headlines over the past five years. Information System Security (INFOSEC) is a perception.  You can follow all the rules and best practices, implement the best technologies, check all of the boxes, and still get hacked.  While a … Read more

From the Fall 2017 Issue

LMI Practical Government Management For An Increasingly Complex World

Author(s):

George Berkheimer, Staff Reporter, United States Cybersecurity Magazine

Establishing a robust cybersecurity defense is no simple task for even the smallest of enterprises. The problems and challenges grow ever more difficult as the size and scope of systems requiring protection increases. The federal government, by comparison, represents perhaps the ultimate challenge with its complex structure of agencies. Each of these in turn has … Read more

From the Summer 2017 Issue

Penetration Testing Helps Federal Agencies Explore the Art of the Possible

Author(s):

George Berkheimer, Staff Reporter, United States Cybersecurity Magazine

In two separate cybersecurity attacks in recent years, hackers using stolen third-party vendor credentials managed to harvest debit and credit card information from 160 million combined Home Depot and Target customers. The retailers took a major hit to their reputations, not to mention their bottom lines: $300 million and counting for settlements, legal fees, customer … Read more

From the Spring 2017 Issue

CompTIA Trade Association Promotes Symbiotic Benefits For The IT Ecosystem

Author(s):

George Berkheimer, Staff Reporter, United States Cybersecurity Magazine

When five New York City area microcomputer dealers joined forces in 1982 to form the Association of Better Computer Dealers (ABCD), their idea was to find better ways to do business in the early days of the personal computer. ABCD began modestly, with a membership directory and vendor chats. In 1990, it changed its name, … Read more

From the Winter 2017 Issue

CyberUSA Building National Resilience

Author(s):

Staff Writer, , United States Cybersecurity Magazine

“It is imperative that American communities pull together on cybersecurity.” warns Tom Ridge, the nation’s first Secretary of Homeland Security and Chairman for the recently launched non-profit CyberUSA. “This is the new battlefront for both national security and economic security. That’s why we need to organize better nationally to get our private sector working together … Read more

From the Fall 2016 Issue

Counting Down from Zero

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

“Zero-day.”  The word is enough to strike fear into the hearts of even the most seasoned cyber-warriors. If a zero-day vulnerability has been uncovered in the system they’re supposed to be defending, all of their training and preparation, their work hardening the network to attacks, has been rendered null and void. There’s no point in … Read more

From the Summer 2016 Issue

Eyes on the Inside: Combating the Insider Threat

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

Jim Mazotas would never forget the call. His company was doing a vulnerability audit for a medium-sized university which suspected its admins of misconduct. The work had started on a Friday, and would continue for the entire weekend; he got the call on Sunday night. “[My team] said, ‘You need to come over here,’” Mazotas … Read more