From the Fall 2017 Issue

BUILDING FOR SUCCESS: The Importance of Cloud Security

Author(s):

Vijaya Varma, Co-Founder and CTO, AxiomIO, Inc.

As organizations adopt Cloud technologies and capabilities, it’s important to discuss how secure (or insecure!) Cloud really is. Security concerns with respect to Cloud computing are similar to those of a traditional information technology (IT) setup. Even though Cloud providers such as Amazon Web Services (AWS), Microsoft Azure and the Google Cloud Platform (GCP) make … Read more

From the Fall 2017 Issue

Security by Design

Author(s):

Jeff Spivey, CRISC, CPP, PSP, CEO, Security Risk Management, Inc.

A holistic “life cycle” perspective is to prioritize security risk levels of security for the proper governance and management of all security. The future is already here — It’s just not evenly distributed yet.  William Gibson, Neuromancer The complexity of protecting our personal and organizational value is increasingly difficult to navigate.  Similarly, threats come from … Read more

From the Fall 2017 Issue

Legacy Modernization as a Cybersecurity Enabler

Author(s):

Henry J. Sienkiewicz, Author,

Dependencies on information technology began logically enough. In a technology-driven and dependent marketplace, enterprises seek to leverage information technology to improve their market position. Industries adopted COBOL-based software and mainframe computers for statistical reporting, accounting, claims, policy administration, billing and various information-processing activities.1 Many mainframe and legacy applications are older and require significant upgrades in … Read more

From the Fall 2017 Issue

16 Tons of Technical Debt: An Operational Perspective on Security Automation

Author(s):

J.C. Herz, COO, Ion Channel

In September of 2017, Equifax announced that extremely sensitive data, including social security numbers and driver’s license information, had been exfiltrated by hackers via the Apache Struts framework used to develop the credit rater’s website – a framework that powers thousands of large enterprises’ websites as well. Given the scope of the damage enabled by … Read more

From the Summer 2017 Issue

A Case for Collaboration

Author(s):

Chris Castaldo, Senior Director of Information Security, 2U

In my many years of working in cybersecurity, I’ve found the only thing that can truly secure an organization is collaboration. The most important part of “people, process, technology” is the people. No one in their right mind would tell you it’s possible to prevent 100% of breaches — but, through powerful internal and external … Read more

From the Spring 2017 Issue

Navigating a Hostile Cyberspace: A Primer for Small Business

Author(s):

Hilary MacMillan, Vice President, Solutions Architecture, Secure Channels, Inc.

Imagine the following: You are the CEO of a small, innovative toy company. It’s the day before Thanksgiving and you were supposed to be home two hours ago. An email pops into your inbox; it’s an invoice from a supplier. You open it, thinking you should at least see what the damage is. But, the … Read more

From the Spring 2017 Issue

Army Turns to Aberdeen Proving Ground for Cyber Capabilities

Author(s):

Dan Lafontaine, Public Affairs Specialist, DSA Inc. Supporting U.S. Army Program Executive Office C3T

Paul D. Mehney, Director, Public Communications U.S. Army Communications and Electronics Command

The boundaries between traditional cyber threats, such as the penetration of a network and theft of data, and more traditional electronic warfare threats, such as the employment of improvised explosive devices that use the electromagnetic spectrum, have been blurred. This convergence presents challenges and opportunities for tactical assets and networks. For the Army, this new … Read more

From the Winter 2017 Issue

An Analytical Framework for Cybersecurity Assessment

Author(s):

Dr. Colonel Gabi Siboni, Founder, G. Bina Ltd.

Cyber threats have become a major problem for every organization. There are many technological solutions, defenses, a lot of advice and many advisors. Before these can be effective, an organization must be able to frame the problem. Specifically, it must understand whether its defenses can mitigate cyber risks, and whether they are effective against existing … Read more