From the Winter 2021 Issue

Five Approaches and Tools For Organizations to Mitigate Their IoT/ICS Cyber Risks

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

Sam Kendrick, Student – Technology Management Program, Georgetown University (Co-author)

5 Approaches

Infrastructure is everything you don’t think about.  The roads you drive on. The rigs and refineries that turn fossil fuel into the gas that makes your car go. The electricity that power the streetlights and lamps that guide your way. All these technologies that vanish into the oblivians of normalcy.”  Ian Bogost, The Atlantic[1] From … Read more

From the Fall 2020 Issue

COVID-19 and Cybersecurity

Author(s):

Connie Uthoff, Program Director, The George Washington University

COVID-19-and cybersecurity

On January 31, 2020, the U.S. Secretary of Health and Human Services (HHS) declared COVID-19 a public health emergency.[1] As the virus spread around the globe, cybercriminals quickly exploited the crisis for commercial gain. In the early months of 2020, as the global death toll rose, nations battled with the disease, and communities were at their … Read more

Hospitality Breaches

Author(s):

Josh Henry, ,

Hospitality Breach picture of Courtyard Marriott

Leaving the Light on for Everyone Hospitality breaches are the newest target for bad actors. Data breaches are making headlines more and more. As a result, large corporations in the hospitality industry are acquiring large targets on their back. Of course, this is no surprise. In fact, this problem has escalated since last year. Needed … Read more

IOT Devices- Information Outsourcing Terror

Author(s):

Josh Henry, ,

Iot Device Alexa against a blue background, speech bubble with gears.

IoT Devices are on the Rise A rising trend in consumer markets today are the virtual assistant such as Amazon’s Echo or the Google mini. Juniper Research predicts that 55% of homes in the U.S. will feature an IOT device by 2022. This ushers in a debate regarding the privacy and security of your information. … Read more

Dark Web: Unpacking the Notoriety

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Dark Web Silk Road anonymous marketplace drugs index

If you are internet savvy, or into Creepypastas, you absolutely have heard of the dark web. What started out as a little trivia fact (did you know 99% of the internet is The Deep Web?!) has morphed into something else entirely. The Legend of the Dark Web Because the dark web is non-indexable, Google can … Read more

From the Summer 2016 Issue

Cyber Attacks and Legal Malpractice

Author(s):

Ethan S. Burger, Adjunct Professor, Washington College of Law

Over a year ago, Citibank criticized many of the largest law firms for their reluctance to: …discuss or even [publicly] acknowledge breaches that result [ed] in the release of their clients’, employees’, and counterparts’ confidential personal data, which has frustrated law enforcement and corporate clients for several years. That frustration bubbled over in an internal … Read more

From the Summer 2016 Issue

Cybersecurity Checkup: Preventing Breaches in Healthcare

Author(s):

Joseph S. Abrenio, Vice President of Commercial Services, Delta Risk LLC

The Evolving State of Healthcare Cyber-Attacks The healthcare sector has gone from being a secondary target for threat actors to landing squarely in the bullseye. In 2015, more than 100 million healthcare records were reportedly compromised, with five of the eight largest healthcare breaches since 2010 taking place in the first six months of 2015. … Read more

From the Summer 2016 Issue

Outcome-Based Cyber Defense

Author(s):

Duane Wilson, Director of Strategic Cyber Initiatives, Sabre Systems Inc.

According to CNN Money, more than 317 million new pieces of malware – computer viruses or other malicious software – were created last year. This means nearly one million new threats were released each day. This has been the case since the Morris Worm incident of 1988, and is predicted to get worse.1 Traditional cybersecurity … Read more

From the Summer 2016 Issue

The New Top Ten in Cybersecurity: Things Have Changed Dramatically

Author(s):

T. Casey Fleming, Chairman and CEO, BLACKOPS Partners Corporation

FORGET WHAT YOU THINK YOU KNOW ABOUT CYBERSECURITY. The Internet was initially developed only as an electronic communication method. Security did not become a concern until many years later, as the Internet matured. As threats mounted, the industry’s answer was to develop new software and hardware products to defend the perimeter of the network. Each … Read more

From the Spring 2016 Issue

The Need for a Cybersecurity Neighborhood Watch

Author(s):

Rick Lipsey, Senior Strategic Cyber Lead, LMI

As crime rates rose in the early 1970s, Americans began coming together to improve the security of their neighborhoods. They established stronger communities, promoted pride, and built trust that brought members together to deter would-be criminals.  They exchanged ideas and best practices for securing their homes and protecting themselves. Collectively and individually, they developed a clearer … Read more