From the Spring 2016 Issue

Restoring Trust in Healthcare

Author(s):

Robert Lord, Co-Founder, Protenus, Inc.

As every medical student graduates from their M.D. program and formally attaches the prefix “Dr.” to their names, they recite the Hippocratic Oath. While this oath has undergone many revisions over the years, it continues to bind students to a centuries-old tradition of physicians and healers. While much of the Oath deals with the literal … Read more

From the Spring 2016 Issue

Read This Before You Get Hacked Again

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

Review: Hacked Again, Scott N. Schober, 2015 The cover of Scott N. Schober’s book, Hacked Again, informs us that “It can happen to anyone – even a cybersecurity expert”. While this tagline is clearly meant to grab a potential reader’s attention, it also happens to be true. The recent wave of high-profile data breaches confirms … Read more

From the Spring 2016 Issue

What Is Coming out of Your Network?

Author(s):

Nathan Hartzell, , Visionist, Inc.

Regularly testing your border defenses and internal network protections are integral to keeping adversaries out of your network. But, to paraphrase a Bible verse, it is not only what goes into a network that causes problems, but what comes out of it. Knowing what is leaking out of your network is a critical component of … Read more

From the Winter 2016 Issue

Multinationalism in Digital Forensics

Author(s):

Paul Kubler, Head of Red Team Operations, CYBRI

Native-language tools and exploits have recently started gaining momentum in the ever-growing sphere of multinational cybercrime, as hackers develop tools in their own language. It’s common knowledge that much of the malware discovered today has been written by foreign language-speaking authors. In a speech to the Australian National Press Club two years ago, Eugene Kaspersky … Read more

From the Winter 2016 Issue

ASK THE EXPERTS: Seven Global Leaders Advise on Digital Risk

Author(s):

Daren Dunkel, Manager, Enterprise Sales, Amazon Web Services

“The time for complacency is over. Every company is vulnerable to cyber-attacks and directors have a responsibility to ensure that resources are deployed to detect and defend against them.”  – Nicole Eagan, CEO of Darktrace  In 2015, senior executives and their board members were challenged with cybersecurity threats to their businesses that their predecessors never … Read more

From the Winter 2016 Issue

Rejecting Anonymity: Confronting the Internet’s Insecure Architecture

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

In @War: The Rise of the Military-Internet Complex, Shane Harris wrote:  The Internet offered a cloak of anonymity. Anyone could set up an e-mail address with a fake name using Google or Hotmail, which had millions of customers and kept their data in repositories located around the world. Those people were hard enough to find. … Read more