From the Fall 2017 Issue

Opting in to Cyber Vulnerablity Part 2: Technical Education in America

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

In the previous article in the United States Cybersecurity Magazine, Volume 5, Number 16 titled “Opting in to Cyber Vulnerability”, we examined the broad, “opt-in” nature of information insecurity in the United States. This article continues with an examination of the American educational enterprise with respect to preparing American students to safely and securely navigate … Read more

From the Fall 2017 Issue

Q&A Interview with Zane Lackey of Signal Sciences

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Signal Sciences develops a web protection platform that provides comprehensive threat protection and security visibility for web applications, microservices, and APIs on any platform. To answer some pertinent questions for our readers about emerging trends in security and DevOps, United States Cybersecurity Magazine conducted a Question & Answer interview with Zane Lackey, Signal Science’s co-founder … Read more

From the Fall 2017 Issue

from the {EDITOR-IN-CHIEF}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, On October 4th, 1957, the Soviet Union launched the world’s first man-made earth satellite, Sputnik 1. The American public was shocked by what appeared to be a triumph of Soviet engineering, and further dismayed by the televised, and spectacular, failure of the the American Vanguard Test Vehicle 3 launch vehicle two months later. Blame … Read more

From the Summer 2017 Issue

Opting in to Cyber Vulnerability

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Weak Nations, Asymmetric Warfare and Power Projection America’s rivals routinely employ offensive cyber operations to influence American actions and policy.  Despite claims made by pundits and the press, these are not powerful countries, and their reliance on cyber operations and asymmetric warfare betrays them as weak players on the international stage, unable to project power … Read more

From the Summer 2017 Issue

from the {EDITOR-IN-CHIEF}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

adam-firestone

Hello, If we were crying out for tangible evidence of the cost of cyber insecurity, we’d need to look no further than the headlines. (It’s always in the headlines!) On August 7th, attackers posted a video ransom note demanding $7.5 million in return for stolen HBO intellectual property. It seems that the good guys just … Read more

From the Spring 2017 Issue

It’s Not the Breach, It’s the Data: A Case for Deterrence by Denial

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

In his 1935 book, War is a Racket1, retired Marine Corps Major General (and two-time Medal of Honor recipient) Smedley Butler2 discussed the financial incentives and commercial benefits that lead nations to engage in armed conflict. Modern day motivations are no different. Verizon reported that, in 2016, “89% of breaches had a financial or espionage … Read more

From the Spring 2017 Issue

from the{EDITOR-IN-CHIEF} 

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, Boy, the hits just keep on coming, don’t they? No sooner has the dust settled on the last well-publicized breach, attack or vulnerability, than the next one pops up in the headlines. As the doxxing of the Democratic National Committee (DNC) by foreign hackers began to fade from the American collective consciousness, we were … Read more

From the Winter 2017 Issue

from the{EDITOR-IN-CHIEF} 

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, The dust never really settles on cyber and information security. Immediately following one of the most contentious presidential races in American history, focus shifted to questions about the impact cyber-attacks may have had on the election’s outcome. Election hacking so dominates the discussion that the Yahoo breach, estimated to have impacted over a billion … Read more

From the Fall 2016 Issue

Safeguarding American Democracy: Outcome-Based Cybersecurity in Election 2016

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

If you’re asking how foreign hackers can be prevented from manipulating the election, you’re asking the wrong question.  On May 31st, 1916, the British battlecruisers Indefatigable, Queen Mary, and Invincible were sunk within two and a half hours by the Imperial German Navy’s High Seas Fleet during the Battle of Jutland. In response to the … Read more

From the Fall 2016 Issue

from the{EDITOR-IN-CHIEF}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, October is National Cyber Security Awareness Month (NCSAM). NCSAM is an annual campaign sponsored by the National Cyber Security Division (NCSD) within the Department of Homeland Security (DHS) and the National Cyber Security Alliance (NCSA), a non-profit organization that encourages everyone and anyone who uses technology to be vigilant and prudent with respect to … Read more