From the Fall 2017 Issue

16 Tons of Technical Debt: An Operational Perspective on Security Automation

Author(s):

J.C. Herz, COO, Ion Channel

In September of 2017, Equifax announced that extremely sensitive data, including social security numbers and driver’s license information, had been exfiltrated by hackers via the Apache Struts framework used to develop the credit rater’s website – a framework that powers thousands of large enterprises’ websites as well. Given the scope of the damage enabled by … Read more

From the Summer 2017 Issue

A Case for Collaboration

Author(s):

Chris Castaldo, Senior Director of Information Security, 2U

In my many years of working in cybersecurity, I’ve found the only thing that can truly secure an organization is collaboration. The most important part of “people, process, technology” is the people. No one in their right mind would tell you it’s possible to prevent 100% of breaches — but, through powerful internal and external … Read more

From the Spring 2017 Issue

Navigating a Hostile Cyberspace: A Primer for Small Business

Author(s):

Hilary MacMillan, Vice President, Solutions Architecture, Secure Channels, Inc.

Imagine the following: You are the CEO of a small, innovative toy company. It’s the day before Thanksgiving and you were supposed to be home two hours ago. An email pops into your inbox; it’s an invoice from a supplier. You open it, thinking you should at least see what the damage is. But, the … Read more

From the Spring 2017 Issue

Army Turns to Aberdeen Proving Ground for Cyber Capabilities

Author(s):

Dan Lafontaine, Public Affairs Specialist, DSA Inc. Supporting U.S. Army Program Executive Office C3T

Paul D. Mehney, Director, Public Communications U.S. Army Communications and Electronics Command

The boundaries between traditional cyber threats, such as the penetration of a network and theft of data, and more traditional electronic warfare threats, such as the employment of improvised explosive devices that use the electromagnetic spectrum, have been blurred. This convergence presents challenges and opportunities for tactical assets and networks. For the Army, this new … Read more

From the Winter 2017 Issue

An Analytical Framework for Cybersecurity Assessment

Author(s):

Dr. Colonel Gabi Siboni, Founder, G. Bina Ltd.

Cyber threats have become a major problem for every organization. There are many technological solutions, defenses, a lot of advice and many advisors. Before these can be effective, an organization must be able to frame the problem. Specifically, it must understand whether its defenses can mitigate cyber risks, and whether they are effective against existing … Read more

From the Winter 2017 Issue

Cybersecurity and Small Business Survival

Author(s):

David Thomas, MCSE, Director of Technology Services, Kenneally Technology Services

The “little guy mentality” can no longer be relied upon to protect and safeguard your systems in today’s environment.  Much attention has been paid to major data breaches that have affected large corporations, United States government agencies, not-for-profits and political organizations. This attention has resulted in the allocation of significant resources, both monetary and intellectual, … Read more

From the Winter 2017 Issue

TOP 10 Cybersecurity Conference Tips

Author(s):

Paul de Souza, CSFI-CWD (Cyber Warfare Division) Founder Director, Military Cyber Professionals Association (MCPA)

As cyber security professionals, many of us enjoy attending conferences and events for a variety of reasons. No matter your intent or agenda, there are certain principles to follow that will help you get the most out of your conference experience. Perception can be reality. People observe, people talk, people share. How you are perceived … Read more