From the Winter 2019 Issue

Irresistible Forces and Immovable Objects: When National Security and Cybersecurity Collide

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

AdamFirestone-feature-image-wn19

Security is inherently binary, like being alive or being married. Just as you can’t be “almost married” or “almost alive” (Schrodinger’s cat notwithstanding), you can’t be “mostly secure.”. There’s no way to create a solution that will permit compromise only by certain entities under certain carefully delineated circumstances while defeating all other malicious access attempts. … Read more

From the Winter 2019 Issue

from the Editor-in-Chief

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, At the beginning of 2019, the American cybersecurity community finds itself at a crossroads. Perhaps it might be more appropriate to say that cybersecurity policymakers, technologists, and practitioners find themselves fighting a battle on two fronts. On one side, there’s the traditional hostile cyberspace. We expect this. We’ve trained for this. We’ve built for … Read more

From the Fall 2018 Issue

from the {Editor-in-Chief}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, 2018 marks the 15th anniversary of National Cyber Security Awareness Month (NCSAM), which is observed every October. NCSAM, a collaborative effort between government and industry, is intended to help ensure that every American has the resources needed to stay safer and more secure online. The 2018 NCSAM will focus on consumer cyber safety, recognizing … Read more

From the Summer 2018 Issue

TEOTWAWKI: The Impending Cryptopocalypse

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

AF-TEOTWAWKI-header

In 1889, the New York publisher John Wiley & Sons published an obscure scientific piece by Daniel S. Troy titled The Cosmic Law of Thermal Repulsion: An Essay Suggested by the Projection of a Comet’s Tail. On page 60 of this text, Troy suggests that if the forces of “thermal repulsion” or “gravitational attraction” were … Read more

From the Summer 2018 Issue

from the {Editor-in-Chief}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, It is time to take off the polarized cyberglasses, America, because what we choose not to see can kill us. The language of cybersecurity is laced with modal verbs and their auxiliaries such as “should,” “must,” and “ought to.” These words and phrases are used to express ability, possibility, permission, or obligation. They enable … Read more

From the Spring 2018 Issue

A (Very) Brief History of Pre-Computer Cryptography, Part 2

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

firestone feature image part 2

This is the second part of a two-part article exploring the history of pre-computer cryptography. Part 1 focused on the period from the birth of cryptography some 4,000 years ago to the development of early transposition and substitution ciphers. Part 2 looks at the emergence of cryptanalysis under the Abbasid Caliphate and goes through the … Read more

From the Spring 2018 Issue

from the {EDITOR-IN-CHIEF}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, If you haven’t seen the Beatles’ 1968 animated masterpiece Yellow Submarine, you’re missing out on one of the great treasures of 20th-century cinema. There’s a scene in which Ringo and George are discussing George’s driving off in what Ringo says is his car: Ringo: Hey, that’s my car, lad. George: How do you know … Read more

From the Winter 2018 Issue

A (Very) Brief History of Pre-Computer Cryptography, Part 1

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

A brief History header image

This is the first part of a two-part article exploring the history of pre-computer cryptography.  Part 1 will focus on the period from the birth of cryptography some 4,000 years ago to the development of early transposition and substitution ciphers.  Part 2 looks at the emergence of cryptanalysis under the Abbasid Caliphate and goes through … Read more

From the Winter 2018 Issue

from the {Editor-in-Chief}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, It’s tempting to think of cybersecurity as an epic battle for control of global electronic resources, something waged between titans of technology, hidden armies of malicious actors and valiant defenders racing against the clock. That is the image portrayed on the big screen, and, not infrequently, at events like Black Hat, DEFCON and the … Read more