From the Summer 2016 Issue

Identity and Access Management: The Quiet Disruption in Security Engineering

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

We are on the cusp of a revolution in information security engineering. Even a cursory glance at the security technoscape shows a shift away from perimeter-based defenses and their electronic ramparts, bastions, and moats, toward mechanisms that automatically regulate access to data resources and processing functionality in real time. This is consistent with and reflective … Read more

From the Summer 2016 Issue

from the{EDITOR-IN-CHIEF}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, It’s my great pleasure and honor to accept the role of Editor-in-Chief of the United States Cybersecurity Magazine. Cybersecurity presents a challenge unique in the history of our country. Over the last forty years, a distinctly American public-private partnership has resulted in a multifaceted technological, economic, military, social, and creative boom that has transformed … Read more

From the Winter 2016 Issue

Rejecting Anonymity: Confronting the Internet’s Insecure Architecture

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

In @War: The Rise of the Military-Internet Complex, Shane Harris wrote:  The Internet offered a cloak of anonymity. Anyone could set up an e-mail address with a fake name using Google or Hotmail, which had millions of customers and kept their data in repositories located around the world. Those people were hard enough to find. … Read more

From the Spring 2015 Issue

Cyber Maturity It’s Time to Be Accountable for Our Own Destiny

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Security professionals are a quiet bunch. It’s rare for them to publicly discuss known vulnerabilities used to attack targeted organizations. There are many reasons for this reticence. For one, a professionally laconic demeanor is standard issue in a group for whom operational security is a way of life. For another, today’s victim may very well … Read more