From the Spring 2017 Issue

Navigating a Hostile Cyberspace: A Primer for Small Business

Author(s):

Hilary MacMillan, EVP for Engineering, CyLogic

Imagine the following: You are the CEO of a small, innovative toy company. It’s the day before Thanksgiving and you were supposed to be home two hours ago. An email pops into your inbox; it’s an invoice from a supplier. You open it, thinking you should at least see what the damage is. But, the … Read more

From the Spring 2017 Issue

Army Turns to Aberdeen Proving Ground for Cyber Capabilities

Author(s):

Dan Lafontaine, Public Affairs Specialist, DSA Inc. Supporting U.S. Army Program Executive Office C3T

Paul D. Mehney, Director, Public Communications U.S. Army Communications and Electronics Command

The boundaries between traditional cyber threats, such as the penetration of a network and theft of data, and more traditional electronic warfare threats, such as the employment of improvised explosive devices that use the electromagnetic spectrum, have been blurred. This convergence presents challenges and opportunities for tactical assets and networks. For the Army, this new … Read more

From the Winter 2017 Issue

An Analytical Framework for Cybersecurity Assessment

Author(s):

Dr. Colonel Gabi Siboni, Founder, G. Bina Ltd.

Cyber threats have become a major problem for every organization. There are many technological solutions, defenses, a lot of advice and many advisors. Before these can be effective, an organization must be able to frame the problem. Specifically, it must understand whether its defenses can mitigate cyber risks, and whether they are effective against existing … Read more

From the Winter 2017 Issue

Cybersecurity and Small Business Survival

Author(s):

David Thomas, MCSE, Director of Technology Services, Kenneally Technology Services

The “little guy mentality” can no longer be relied upon to protect and safeguard your systems in today’s environment.  Much attention has been paid to major data breaches that have affected large corporations, United States government agencies, not-for-profits and political organizations. This attention has resulted in the allocation of significant resources, both monetary and intellectual, … Read more

From the Winter 2017 Issue

TOP 10 Cybersecurity Conference Tips

Author(s):

Paul de Souza, CSFI-CWD (Cyber Warfare Division) Founder Director, Military Cyber Professionals Association (MCPA)

As cyber security professionals, many of us enjoy attending conferences and events for a variety of reasons. No matter your intent or agenda, there are certain principles to follow that will help you get the most out of your conference experience. Perception can be reality. People observe, people talk, people share. How you are perceived … Read more