How to Set up Two-Step Verification on Your Social Media Accounts

Author(s):

Mary Steinford, ,

Two-Step Verification

One of the most remarkable developments in the consumer technology industry in the past two decades is the emergence of social media networks. Social media has revolutionized the sort of social connections and interactions we have offline. Additionally, it has enhanced how we communicate and stay informed. Nowadays, billions of people around the world use … Read more

Equifax was Careless With Your Data

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Josh Henry, ,

Data breach and private personal information theft as a technology security concept as a digital thief stealing code as a computing risk idea in a 3D illustration style. Equifax

The Cost of Carelessness Is it possible to quantify carelessness? Recent news about Equifax has shown the veracity of carelessness seen in the cybersecurity department of major corporations and countries. This year alone, we have seen many companies that we trust with our personal information fail us. Because of this, the catastrophic failures of cybersecurity … Read more

From the Spring 2015 Issue

Looking to Make Your Leap: Protecting Yourself from Threats and Breaches in the Cloud

Author(s):

Vaughan Emery, President & CEO, CENTRI Technology

More businesses are moving their data to the cloud, due to its many attractive benefits: lower capital and operational overhead, faster and more efficient scalability, and increased flexibility, to name a few. According to a RightScale study,1 87 percent of businesses surveyed have migrated some or all of their communications and IT infrastructure to the … Read more

From the Spring 2015 Issue

How Connected Is Too Connected? Cybersecurity for a Fully Networked World

Author(s):

Darin Andersen, Chairman & Founder, CyberTECH

The Internet of Things (IoT) has become one of the hottest topics among security and privacy experts in the last two years. In October 2013, when CyberTECH produced “Securing the Internet of Things,” the first “think tank” event on the topic, most people where just coming to terms with what the IoT was and what … Read more

From the Spring 2015 Issue

The Evolution of Information Security, Part One

Author(s):

Will Janssen, Business Development Director, Signals Defense

In 1980 Alvin Toffler famously declared that there are three waves of civilization – Agricultural (lasted centuries), Industrial (lasted decades), and the Information Age (now).1 Each new wave pushes the preceding wave aside. Information security operates in the Physical, “Wired” IT (information technology), and Radio Frequency (RF) operational domains. So, in a similar vein to … Read more

From the Winter 2015 Issue

Seeing the Entire Elephant: Or,You’re Not Secure if You’re Not Completely Secure

Author(s):

Anne Kohnke, Assistant Professor of IT, Lawrence Technological University

Dan Shoemaker, Professor - Center for Cyber Security, University of Detroit Mercy

Almost everybody thinks, or would like to think, that the systems that power our society are secure. That would be a seriously incorrect assumption. The fact is that America’s electronic infrastructure is riddled with the type of vulnerabilities that have allowed computer crime to officially surpass the drug trade in the past decade. To illustrate … Read more

From the Winter 2015 Issue

What You Don’t See Can Hurt You

Author(s):

Peter Velikin, Vice President of Marketing, Pwnie Express

Protecting enterprises from hacks and other malicious activity is a challenge for organizations, both in the public and private sectors. The drumbeat of breaches continues and there are no signs of it slowing. The stakes have never been higher. The types and frequency of attacks are increasing and securing your organization has never been more … Read more

From the Winter 2015 Issue

Debunking the Big Bad “Cloud”

Author(s):

Kris Martel, EVP of Operations, Chief Information Security Officer, Emagine IT

There are some topics that seem to be shrouded with uncertainty and confusion and the “Cloud” is one of those topics. I was talking with a fellow CISO of a Federal Agency a few weeks back and the topic of “cloud migration” came up. Not unexpectedly, my CISO friend expressed that the biggest obstacles to … Read more

From the Fall 2014 Issue

Your Network is Secure But Where is Your Data?

Author(s):

David K. Shepherd, CISSP, PMP, Senior Consultant, LMI

The Problem One of your most productive engineers has spent the last month working on a deliverable for your biggest client. The final document is over 200 pages and includes complex engineering drawings, schematics of systems and a variety of highly detailed images. He needs to update some figures so that it will be ready … Read more