From the Summer 2014 Issue

Cybersecurity in the Supply Chain

Author(s):

Taylor Wilkerson, Program Manager, Supply Chain Management Program, LMI

For most of us, cybersecurity means network and data protection. We think of intrusion detection, firewalls, secure network design, secure and trained workforce, social engineering, and other security activities. Essentially, we view cybersecurity as the tools and activities that keep our networks and the data that they handle secured. But what if one of the … Read more

From the Spring 2014 Issue

Near-Term Vision of IT Security Threat Monitors

Author(s):

Benjamin Shelton, , Nangwik Services

Don Tobin, ,

Continuously updating, learning and optimizing in an ever-changing “threatscape”   As most information security professionals are aware, breaches go from initial point of entry to data extraction in a matter of hours or seconds, yet their detection, analysis, and remediation is usually measured in weeks. New techniques and approaches are needed to shrink this time difference. There … Read more

From the Spring 2014 Issue

Preventing Friends and Foes from CyberSpying on YOU

Author(s):

Dr. Christopher V. Feudo, President, University of Fairfax

We all are well aware that cyber attacks continue to increase in complexity, frequency and severity. These malicious cyber activities continue to grow at an unprecedented rate, severely threatening the nation’s public and private information infrastructure, as well as our very essence – our identities, our data, our personal conversations, our finances, and all aspects … Read more

From the Spring 2014 Issue

Eliminating Threat Vectors in Cyber Attacks

Author(s):

Steve Stratton, Vice President, Business Development, COPT

Question: Can infrastructure play a positive role in your Cybersecurity program? Most often we think of infrastructure in a negative way, something we have to protect. It is the mess that we have to attempt to control through policy, procedures, technology and training. It takes a lot of different systems, network and data security components … Read more

From the Spring 2014 Issue

Wireless Security: Not just 802.11 Anymore

Author(s):

Rick Mellendick, Chief Security Officer, PIAchievers

With the increase of organizations establishing wireless networks, including wireless guest networks, as well as creating Bring Your Own Device (BYOD) environments, organizations have increased their susceptibility to newer types of threats. Organizations are struggling to balance convenience with security and too often, convenience is being implemented proactively while security is being implemented reactively. When … Read more

From the Winter 2014 Issue

Cost Effective Security Assessments in Remote Locations

Author(s):

Gabe Koss, , Pwnie Express

Imagine a large bank. It has large corporate offices in several major cities in the United States and over 1000 branch offices across the country. It even has international branches. All of these different locations mean the bank functions on a large-scale, distributed infrastructure.  Being a bank, like government institutions, they are subject to varying … Read more

From the Winter 2014 Issue

It’s Time for a New Approach to Mitigate Insider Threats

Author(s):

Richard Park, Director of Product Management, Hexis Cyber Solutions

Recent high-profile national security breaches, such as the Edward Snowden and Bradley Manning cases, underscore the need for a new approach to detecting and mitigating insider threats. One emerging trend is the importance of big data security analytics and automated response. In a March 2012 report Gartner states that “information security is becoming a big … Read more

From the Winter 2014 Issue

Securely Enabling Bring Your Own Device (BYOD)

Author(s):

Jonathan Halstuch, End User Computing Architect, RackTop Systems, LLC

Companies are allowing and embracing Bring Your Own Device (BYOD) policies within the organization for a multitude of reasons. Reasons for implementing BYOD include increased productivity, simplifying IT, response to employee demand and of course the most popular reason, cost savings. To that end it is important when undertaking the implementation of a BYOD strategy … Read more

From the Winter 2014 Issue

The Data Center of Tomorrow

Author(s):

Mark Gilbert, Director, Business Development, COPT Data Center Solutions

While it might be hard to imagine today, it can be argued that the Data Center of the future will be nothing more than an extremely large USB thumb drive. As absurd as that sounds, with the explosion of connected devices, content creation and Big Data analytics, demand is increasing for storage space. A mind … Read more