From the Spring 2014 Issue

Preventing Friends and Foes from CyberSpying on YOU

Author(s):

Dr. Christopher V. Feudo, President, University of Fairfax

We all are well aware that cyber attacks continue to increase in complexity, frequency and severity. These malicious cyber activities continue to grow at an unprecedented rate, severely threatening the nation’s public and private information infrastructure, as well as our very essence – our identities, our data, our personal conversations, our finances, and all aspects … Read more

From the Spring 2014 Issue

Eliminating Threat Vectors in Cyber Attacks

Author(s):

Steve Stratton, Vice President, Business Development, COPT

Question: Can infrastructure play a positive role in your Cybersecurity program? Most often we think of infrastructure in a negative way, something we have to protect. It is the mess that we have to attempt to control through policy, procedures, technology and training. It takes a lot of different systems, network and data security components … Read more

From the Spring 2014 Issue

Wireless Security: Not just 802.11 Anymore

Author(s):

Rick Mellendick, Chief Security Officer, PIAchievers

With the increase of organizations establishing wireless networks, including wireless guest networks, as well as creating Bring Your Own Device (BYOD) environments, organizations have increased their susceptibility to newer types of threats. Organizations are struggling to balance convenience with security and too often, convenience is being implemented proactively while security is being implemented reactively. When … Read more

From the Winter 2014 Issue

Cost Effective Security Assessments in Remote Locations

Author(s):

Gabe Koss, , Pwnie Express

Imagine a large bank. It has large corporate offices in several major cities in the United States and over 1000 branch offices across the country. It even has international branches. All of these different locations mean the bank functions on a large-scale, distributed infrastructure.  Being a bank, like government institutions, they are subject to varying … Read more

From the Winter 2014 Issue

It’s Time for a New Approach to Mitigate Insider Threats

Author(s):

Richard Park, Director of Product Management, Hexis Cyber Solutions

Recent high-profile national security breaches, such as the Edward Snowden and Bradley Manning cases, underscore the need for a new approach to detecting and mitigating insider threats. One emerging trend is the importance of big data security analytics and automated response. In a March 2012 report Gartner states that “information security is becoming a big … Read more

From the Winter 2014 Issue

Securely Enabling Bring Your Own Device (BYOD)

Author(s):

Jonathan Halstuch, End User Computing Architect, RackTop Systems, LLC

Companies are allowing and embracing Bring Your Own Device (BYOD) policies within the organization for a multitude of reasons. Reasons for implementing BYOD include increased productivity, simplifying IT, response to employee demand and of course the most popular reason, cost savings. To that end it is important when undertaking the implementation of a BYOD strategy … Read more

From the Winter 2014 Issue

The Data Center of Tomorrow

Author(s):

Mark Gilbert, Director, Business Development, COPT Data Center Solutions

While it might be hard to imagine today, it can be argued that the Data Center of the future will be nothing more than an extremely large USB thumb drive. As absurd as that sounds, with the explosion of connected devices, content creation and Big Data analytics, demand is increasing for storage space. A mind … Read more

From the Winter 2014 Issue

Security in a Mobile World

Author(s):

James Screven, Staff Reporter,

Defining the Problem  As the workplace continues to transform and workers continue to seek out non-traditional work spaces, employees will increasingly work more from mobile devices. Laptops, tablets, hybrid convertibles (laptop/tablet) and smartphones have liberated us from the cubicle, while corporations have benefitted from this mobile device revolution through increased productivity. Mobility, albeit liberating, brings … Read more