From the Spring 2019 Issue

An Information Security Triality: Balancing Security, Surveillance, and Convenience

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Information Triality

Information security cultural iconography focuses on heroic and demonic archetypes, resulting in a pageant of evocative, emotional imagery that influences reportage, regulation, acquisition, enterprise governance, and the choices made by individuals with respect to their digital personae. The angels (in the epic struggle in the wires between good and evil) are the network defenders. They … Read more

From the Spring 2019 Issue

From the {EDITOR-IN-CHIEF}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, As Cassius said to Brutus in Act I, Scene 2 of Shakespeare’s Julius Caesar, “The fault, dear Brutus, is not in our stars, But in ourselves.” And so it is with the American cybersecurity community writ large. At the risk of igniting the fires of controversy, it’s time to draw a line in the … Read more

From the Winter 2019 Issue

Irresistible Forces and Immovable Objects: When National Security and Cybersecurity Collide

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

AdamFirestone-feature-image-wn19

Security is inherently binary, like being alive or being married. Just as you can’t be “almost married” or “almost alive” (Schrodinger’s cat notwithstanding), you can’t be “mostly secure.”. There’s no way to create a solution that will permit compromise only by certain entities under certain carefully delineated circumstances while defeating all other malicious access attempts. … Read more

From the Winter 2019 Issue

from the Editor-in-Chief

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, At the beginning of 2019, the American cybersecurity community finds itself at a crossroads. Perhaps it might be more appropriate to say that cybersecurity policymakers, technologists, and practitioners find themselves fighting a battle on two fronts. On one side, there’s the traditional hostile cyberspace. We expect this. We’ve trained for this. We’ve built for … Read more

From the Fall 2018 Issue

from the {Editor-in-Chief}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, 2018 marks the 15th anniversary of National Cyber Security Awareness Month (NCSAM), which is observed every October. NCSAM, a collaborative effort between government and industry, is intended to help ensure that every American has the resources needed to stay safer and more secure online. The 2018 NCSAM will focus on consumer cyber safety, recognizing … Read more

From the Summer 2018 Issue

TEOTWAWKI: The Impending Cryptopocalypse

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

AF-TEOTWAWKI-header

In 1889, the New York publisher John Wiley & Sons published an obscure scientific piece by Daniel S. Troy titled The Cosmic Law of Thermal Repulsion: An Essay Suggested by the Projection of a Comet’s Tail. On page 60 of this text, Troy suggests that if the forces of “thermal repulsion” or “gravitational attraction” were … Read more

From the Summer 2018 Issue

from the {Editor-in-Chief}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, It is time to take off the polarized cyberglasses, America, because what we choose not to see can kill us. The language of cybersecurity is laced with modal verbs and their auxiliaries such as “should,” “must,” and “ought to.” These words and phrases are used to express ability, possibility, permission, or obligation. They enable … Read more

From the Spring 2018 Issue

A (Very) Brief History of Pre-Computer Cryptography, Part 2

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

firestone feature image part 2

This is the second part of a two-part article exploring the history of pre-computer cryptography. Part 1 focused on the period from the birth of cryptography some 4,000 years ago to the development of early transposition and substitution ciphers. Part 2 looks at the emergence of cryptanalysis under the Abbasid Caliphate and goes through the … Read more

From the Spring 2018 Issue

from the {EDITOR-IN-CHIEF}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, If you haven’t seen the Beatles’ 1968 animated masterpiece Yellow Submarine, you’re missing out on one of the great treasures of 20th-century cinema. There’s a scene in which Ringo and George are discussing George’s driving off in what Ringo says is his car: Ringo: Hey, that’s my car, lad. George: How do you know … Read more