Catfishing: Not Just About Money

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Catfishing, catfish

We live in a time where it is easier than ever to deceive people. For example, the internet now enables us to speak anonymously through message boards, comment sections, and even online games. Additionally, the internet can help you pretend to be a different person. Catfishing is the act of pretending to be someone else … Read more

From the Winter 2016 Issue

Social Insecurity

Author(s):

Natalie Blackbourne, President, Blackbourne Worldwide

Influence and manipulation occur every day. Deadlines at work are accomplished because your boss used their influence to get things done; somehow that adorable Scout talked you into buying an extra box of cookies; or your annoying coworker magically got you to do an extra hour of work after buying you a latte. All of … Read more

From the Winter 2016 Issue

Cybersecurity Takes the Right Person

Author(s):

Don Watson, CISSP, Senior Cyber Instructor/Senior Software Engineer, VOR Technology

There is unprecedented demand right now for qualified cyber specialists to fill the ranks of government and civilian positions.1 Although there are many people with expertise in advanced computer and network technologies, many of these workers lack experience in the security-related aspects of these technologies. As a programmer I wasn’t taught how to write secure … Read more

From the Winter 2016 Issue

How to Gain Allies and Infuence Your Services Team’s Success

Author(s):

Michelle Covert, Manager, Production Support SILA-C, Vertafore

The information security and customer service groups within an organization often make for odd bedfellows, due to the competing and often divergent goals between the two groups. Security teams’ goals are to protect and prevent the loss of customer data, information, proprietary code, or practices; services teams are focused on resolving customer-reported issues as quickly … Read more

From the Fall 2015 Issue

The Role of Social Networks in Securing Cyberspace: Opportunities and Threats

Author(s):

J. L. Billingsley, Advisory Board Member, Cyber Security Forum Initiative

Many in American society today equate social networks with online communities such as Google+ and LinkedIn. However, social networks have existed since the dawn of man. While the prominence of social networks continues to grow and has proven to be a rich research area, we already know a lot about their characteristics. For those of … Read more

From the Fall 2015 Issue

Staying a Move Ahead in Cyber-Chess

Author(s):

Dr. Alenka Brown, President , McClure, Brown & Associates LLC

Dr. Joe McClure VanHoozer, Founder, McClure, Brown & Associates LLC

Mr. Jason Christman, MS, CISSP, PMP, Subject Matter Expert, McClure, Brown, & Associates® LLC

Neurocognitive Patterns in Cyberspace  Humans process somatosensory information – defined by Kandel, et al as “different forms of energy…transformed by the nervous system into different sensations or sensory modalities: vision, hearing, touch/emotion, taste, and smell”1 – at several levels simultaneously. This information, composed of neuro psychometric indicators (NPI) – the verbal and non-verbal cues of … Read more

From the Fall 2015 Issue

Social Engineering: The Root of the Cyber Threat

Author(s):

Douglas Rausch, President, Aurora CyberSecurity Consultants, Inc.

R. “Montana” Williams, Founder and Managing Partner , Titan Rain Cybersecurity, LLC

When conducting reconnaissance of your cyber infrastructure, attackers look for weaknesses they can utilize to successfully penetrate your infrastructure with the least expenditure of resources and risk of being detected. The vulnerabilities created by human action or inaction have always been a potential attack vector. The increased focus on adding technical controls to bolster cyber … Read more