ProcessBolt
From the Winter 2017 Issue

Information Integrity and National Identity

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

History defines who we are and informs how Americans chart the nation’s future. It underpins representative government. Increasingly, historical records and documents are being converted to digital formats. This promises to make essential information available to more Americans than before. There are also troubling implications. It takes only a cursory examination of recent events to … Read more

From the Winter 2017 Issue

from the{EDITOR-IN-CHIEF} 

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, The dust never really settles on cyber and information security. Immediately following one of the most contentious presidential races in American history, focus shifted to questions about the impact cyber-attacks may have had on the election’s outcome. Election hacking so dominates the discussion that the Yahoo breach, estimated to have impacted over a billion … Read more

From the Fall 2016 Issue

Safeguarding American Democracy: Outcome-Based Cybersecurity in Election 2016

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

If you’re asking how foreign hackers can be prevented from manipulating the election, you’re asking the wrong question.  On May 31st, 1916, the British battlecruisers Indefatigable, Queen Mary, and Invincible were sunk within two and a half hours by the Imperial German Navy’s High Seas Fleet during the Battle of Jutland. In response to the … Read more

From the Fall 2016 Issue

from the{EDITOR-IN-CHIEF}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, October is National Cyber Security Awareness Month (NCSAM). NCSAM is an annual campaign sponsored by the National Cyber Security Division (NCSD) within the Department of Homeland Security (DHS) and the National Cyber Security Alliance (NCSA), a non-profit organization that encourages everyone and anyone who uses technology to be vigilant and prudent with respect to … Read more

From the Summer 2016 Issue

Identity and Access Management: The Quiet Disruption in Security Engineering

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

We are on the cusp of a revolution in information security engineering. Even a cursory glance at the security technoscape shows a shift away from perimeter-based defenses and their electronic ramparts, bastions, and moats, toward mechanisms that automatically regulate access to data resources and processing functionality in real time. This is consistent with and reflective … Read more

From the Summer 2016 Issue

from the{EDITOR-IN-CHIEF}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, It’s my great pleasure and honor to accept the role of Editor-in-Chief of the United States Cybersecurity Magazine. Cybersecurity presents a challenge unique in the history of our country. Over the last forty years, a distinctly American public-private partnership has resulted in a multifaceted technological, economic, military, social, and creative boom that has transformed … Read more

From the Winter 2016 Issue

Rejecting Anonymity: Confronting the Internet’s Insecure Architecture

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

In @War: The Rise of the Military-Internet Complex, Shane Harris wrote:  The Internet offered a cloak of anonymity. Anyone could set up an e-mail address with a fake name using Google or Hotmail, which had millions of customers and kept their data in repositories located around the world. Those people were hard enough to find. … Read more

From the Spring 2015 Issue

Cyber Maturity It’s Time to Be Accountable for Our Own Destiny

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Security professionals are a quiet bunch. It’s rare for them to publicly discuss known vulnerabilities used to attack targeted organizations. There are many reasons for this reticence. For one, a professionally laconic demeanor is standard issue in a group for whom operational security is a way of life. For another, today’s victim may very well … Read more