From the Fall 2018 Issue

from the {Editor-in-Chief}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, 2018 marks the 15th anniversary of National Cyber Security Awareness Month (NCSAM), which is observed every October. NCSAM, a collaborative effort between government and industry, is intended to help ensure that every American has the resources needed to stay safer and more secure online. The 2018 NCSAM will focus on consumer cyber safety, recognizing … Read more

From the Summer 2018 Issue

TEOTWAWKI: The Impending Cryptopocalypse

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

AF-TEOTWAWKI-header

In 1889, the New York publisher John Wiley & Sons published an obscure scientific piece by Daniel S. Troy titled The Cosmic Law of Thermal Repulsion: An Essay Suggested by the Projection of a Comet’s Tail. On page 60 of this text, Troy suggests that if the forces of “thermal repulsion” or “gravitational attraction” were … Read more

From the Summer 2018 Issue

from the {Editor-in-Chief}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, It is time to take off the polarized cyberglasses, America, because what we choose not to see can kill us. The language of cybersecurity is laced with modal verbs and their auxiliaries such as “should,” “must,” and “ought to.” These words and phrases are used to express ability, possibility, permission, or obligation. They enable … Read more

From the Spring 2018 Issue

A (Very) Brief History of Pre-Computer Cryptography, Part 2

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

firestone feature image part 2

This is the second part of a two-part article exploring the history of pre-computer cryptography. Part 1 focused on the period from the birth of cryptography some 4,000 years ago to the development of early transposition and substitution ciphers. Part 2 looks at the emergence of cryptanalysis under the Abbasid Caliphate and goes through the … Read more

From the Spring 2018 Issue

from the {EDITOR-IN-CHIEF}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, If you haven’t seen the Beatles’ 1968 animated masterpiece Yellow Submarine, you’re missing out on one of the great treasures of 20th-century cinema. There’s a scene in which Ringo and George are discussing George’s driving off in what Ringo says is his car: Ringo: Hey, that’s my car, lad. George: How do you know … Read more

From the Winter 2018 Issue

A (Very) Brief History of Pre-Computer Cryptography, Part 1

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

A brief History header image

This is the first part of a two-part article exploring the history of pre-computer cryptography.  Part 1 will focus on the period from the birth of cryptography some 4,000 years ago to the development of early transposition and substitution ciphers.  Part 2 looks at the emergence of cryptanalysis under the Abbasid Caliphate and goes through … Read more

From the Winter 2018 Issue

from the {Editor-in-Chief}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, It’s tempting to think of cybersecurity as an epic battle for control of global electronic resources, something waged between titans of technology, hidden armies of malicious actors and valiant defenders racing against the clock. That is the image portrayed on the big screen, and, not infrequently, at events like Black Hat, DEFCON and the … Read more

From the Fall 2017 Issue

Opting in to Cyber Vulnerablity Part 2: Technical Education in America

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

In the previous article in the United States Cybersecurity Magazine, Volume 5, Number 16 titled “Opting in to Cyber Vulnerability”, we examined the broad, “opt-in” nature of information insecurity in the United States. This article continues with an examination of the American educational enterprise with respect to preparing American students to safely and securely navigate … Read more

From the Fall 2017 Issue

Q&A Interview with Zane Lackey of Signal Sciences

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Signal Sciences develops a web protection platform that provides comprehensive threat protection and security visibility for web applications, microservices, and APIs on any platform. To answer some pertinent questions for our readers about emerging trends in security and DevOps, United States Cybersecurity Magazine conducted a Question & Answer interview with Zane Lackey, Signal Science’s co-founder … Read more