Skip to content

Menu

United States Cybersecurity Magazine
United States Cybersecurity Magazine
  • Home
  • Magazine
  • Cybersecurity Channels
    • MSSP Services – CISPOINT
    • Security Testing – Corellium
    • Security Software & Services – Wind River
    • Darknet Intelligence – BOC INTEL
  • Cyber Daily
  • Calendar
  • Resources
Welcome! | Subscribe | Sign In
United States Cybersecurity Magazine
  • Home
  • Magazine
  • Cybersecurity Channels
    • MSSP Services – CISPOINT
    • Security Testing – Corellium
    • Security Software & Services – Wind River
    • Darknet Intelligence – BOC INTEL
  • Cyber Daily
  • Calendar
  • Resources
  • Subscribe
  • Sign In

Topic: Training and Workforce Development

From the Spring 2022 Issue

Training and Workforce Development

Cyber Talent: Hiding in Plain Sight

Author(s):

Dr. Jason Edwards, Director of Cybersecurity Strategy and Planning, USAA

Griffin Weaver, Senior Legal Counsel, Dell Technologies

We live in a time when ransomware attacks, nation-state “cyber warfare,” and having a remote workforce is the norm rather than the exception. If you ask most company executives, particularly those responsible for protecting company … Read more

How to Become a SOC Analyst

Developing the Cybersecurity Workforce, Training and Workforce Development

How to Become a SOC Analyst

Author(s):

Glenn Mabry, Senior Instructor/Security Researcher, Advanced Security

A Security Operations Center, or SOC, is one of the most important departments for any modern business. It is here that the organization’s cybersecurity team does their job, monitoring and analyzing their security networks in … Read more

woman working remotely on computer

Training and Workforce Development

Remote Work Increasing Calls for Improved Security Validation

Author(s):

Zoe King, ,

COVID-19 has changed the world. With social distancing measures ruling everyday life in most countries, the way we used to live, learn, interact, and work has been visibly altered. One of the areas that have … Read more

Women in Cybersecurity
From the Fall 2020 Issue

Training and Workforce Development

SEIZE THE MOMENT: NOW IS THE TIME FOR WOMEN IN CYBERSECURITY

Author(s):

Dr. Diane M. Janosek, Ph.D., Esq., CISSP, CEO, JANOS LLC

The Women in Cybersecurity (WiCyS) annual conference was set to take place in March 2020 in Denver, Colorado. It’s a celebratory event that many women in the cyber industry and academia look forward to – … Read more

AF Workforce Gap image
From the Winter 2020 Issue

Training and Workforce Development

Reassessing the Cyber Workforce Gap

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Epidemiology, with respect to public health, is often used as an analogy when discussing cybersecurity.  The two are strikingly similar, encompassing notions of impacted populations, specialist expertise, containment, and cure. Education is acknowledged as a … Read more

175th Cyberspace Operations Group
From the Fall 2019 Issue

Training and Workforce Development

The Maryland National Guard: Cybersecurity From Army to Air

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

The Maryland National Guard is a state defense team that has over 300 cyber personnel who bring cutting-edge military training and their civilian capabilities to support state and federal missions. The United States Cybersecurity Magazine … Read more

Female Veterans
From the Spring 2019 Issue

Training and Workforce Development

Female Veterans–Ready to Fill Cybersecurity Jobs!

Author(s):

Dr. Amelia Estwick, Program Director, National Cybersecurity Institute at Excelsior College

Current State of the Cybersecurity Industry Our nation’s robust cybersecurity industry will grow from $75 billion in 2015 to $170 billion by 20201. Additionally, the United States White House Administration’s 2019 budget has allocated approximately … Read more

JothiDugar-feature-image-wn19
From the Winter 2019 Issue

Training and Workforce Development

The Art of the Feminine in a Masculine World of Cybersecurity

Author(s):

Jothi Dugar, C|CISO, CISSP, HCIPP, Author

The Psychology of Cybersecurity What is the psychology of cybersecurity, and the role that the Feminine (aka Women) play in it? Why is this important to understand? What does psychology have to do with cybersecurity … Read more

Dianne-Janosek-feature-image-wn19
From the Winter 2019 Issue

Training and Workforce Development

Ladies! Be the Energy in Cybersecurity

Author(s):

Dr. Diane M. Janosek, Ph.D., Esq., CISSP, CEO, JANOS LLC

Did you know that women represent only eleven to fourteen percent of the cybersecurity workforce – and that there has been no real progress in increasing that percentage over the last two years? Women make … Read more

cohen-wood-article-header
From the Fall 2018 Issue

Training and Workforce Development

Cyber Warfare: Are We at DEFCON 1?

Author(s):

Tyler Cohen Wood, CEO, MyConnectedHealth Inc.

The days where war only exists on the battlefield are long gone. Today some of the greatest risks we face are in cyberspace, carried out by nation-state sponsored attackers. What are the threats to individuals, … Read more

Older posts
Page1 Page2 Page3 Next →
Claim your GUIDE
Zero Trust Implementation Guideline
DOWNLOAD HERE

Events Calendar

« March 2026 » loading...
Sun Mon Tue Wed Thu Fri Sat
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
1
2
3
4
Wed 18

Insider Risk Summit West

March 18, 2026 - March 19, 2026
Thu 19

INTERFACE Portland 2026

March 19, 2026 @ 8:30 am - 4:30 pm EDT
Mon 23

RSAC 2026 Conference

March 23, 2026 @ 8:00 am - March 26, 2026 @ 3:30 pm PDT
Tue 24

18th Annual New Jersey C-Level Technology Leadership Summit

March 24, 2026
Wed 25

FutureG for Defense & Warfare Summit

March 25, 2026 - March 26, 2026

Browse By Topic

  • Engineering and Vulnerability Management
  • Training and Workforce Development
  • Industry & Business Best Practices
  • Data Storage and Access
  • Legal

Recent Posts

  • How AI and Edge Computing Are Shaping the Future of DDoS Mitigation
  • Jailbreaking the Matrix
  • Cybersecurity Skills Over Headcount: Navigating the Workforce Shift in an AI-Driven Era
  • Quantum Batteries and the Race to Tame Quantum Computers’ Energy Hunger
  • Safeguarding the Digital Battlefield: The Critical Role of Cryptographic Key Managers

SUBSCRIBE TO OUR CYBERSECURITY COMMUNITY

Subscribe today for free and gain full access to the
United States Cybersecurity Magazine and its archives. In addition, via our newsletter, you will hear from cybersecurity subject matter experts, and will be notified of the release of the next issue of the magazine!

SUBSCRIBE NOW

US CyberSecurity Magazine

  • Subscribe
  • Log In
  • Home
  • Magazine
  • Cybersecurity Channels
    • ArCybr
    • Security Testing – Corellium
    • Security Software & Services – Wind River
    • BOC INTEL
  • Contact Us
  • About
  • Cyber Daily
  • Calendar
  • Resources
  • Advertise With Us
  • Write for Us
  • Privacy Policy
Facebook-f Linkedin-in X Instagram Wordpress

© 2026 American Publishing, LLC™ | 17 Hoff Court, Suite B • Baltimore, MD 21221 | Phone: 443-231-7438
  • Subscribe
  • Log In
  • Home
  • Magazine
  • Cybersecurity Channels
    • ArCybr
    • Security Testing – Corellium
    • Security Software & Services – Wind River
    • BOC INTEL
  • Contact Us
  • About
  • Cyber Daily
  • Calendar
  • Resources
  • Advertise With Us
  • Write for Us
  • Privacy Policy
We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “Accept”, you consent to the use of ALL the cookies.
Do not sell my personal information.
Cookie SettingsAccept
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. These cookies ensure basic functionalities and security features of the website, anonymously.
CookieDurationDescription
cookielawinfo-checkbox-analytics11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics".
cookielawinfo-checkbox-functional11 monthsThe cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional".
cookielawinfo-checkbox-necessary11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary".
cookielawinfo-checkbox-others11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other.
cookielawinfo-checkbox-performance11 monthsThis cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance".
viewed_cookie_policy11 monthsThe cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data.
Functional
Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.
Performance
Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.
Analytics
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
Advertisement
Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.
Others
Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.
SAVE & ACCEPT
Powered by CookieYes Logo