What is the Difference Between Artificial Intelligence, Deep Learning, and Machine Learning?

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Artificial Intelligence, Machine Learning, Deep Learning, Data Mining, Brain in Binary, vaporwave color scheme

Artificial Intelligence has become one of the most overused buzzwords in the cybersecurity field. Cybersecurity buzzwords gain more traction as the world of cybersecurity becomes more omnipresent in our cultural consciousness. Events like the Marriott Hotel Breach and the Facebook User Data scandal have created an atmosphere of paranoia. However, in the wake of an … Read more

(In)Famous Hacking Groups

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Hacking Groups

The Different Hacking Groups Hacking Groups are a staple of cybersecurity culture. Since the 1995 release of the movie Hackers, there has been a very specific subset of cultural cliches we associate with all hacking groups. However, some hacking groups aren’t youthful, energetic teenagers or lone wolfs. In fact, some groups are state sponsored, and … Read more

Catfishing: Not Just About Money

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Catfishing, catfish

We live in a time where it is easier than ever to deceive people. For example, the internet now enables us to speak anonymously through message boards, comment sections, and even online games. Additionally, the internet can help you pretend to be a different person. Catfishing is the act of pretending to be someone else … Read more

Starting a Career in Cybersecurity

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Woman on computer pursuing a career in cybersecurity, University of San Diego, USD, Cybersecurity Career

Cybersecurity is a very large field, filled with many specialized jobs that require a large variety of skills. Though it seems silly to point this out, it is sadly necessary to state that “cybersecurity expert” is not an actual job title. The hardest part of getting a cybersecurity career is knowing how each individual component … Read more

How to Clean Your Computer and Speed it up

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Clean Your Computer, Messy Desktop, Too Many Icons, Computer with messy home screen

It is important to regularly clean your computer. Every computer has two forms of storage, RAM and Hard Drive space. RAM is temporary storage. This dictates how many programs you can simultaneously run on your computer. If your RAM runs out, your computer will use the hard drive space to store the temporary memory. This … Read more

Mobile Security: Safeguarding Your Information

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Mobile Security, phone getting hacked, web, hands on phone, malware

Mobile security is a relatively new field in the world of cybersecurity. The rise of mobile computing calls for an increased vigilance in regards to our personal information. Smart phones and the like are now the standard. In fact, according to the Pew Research Center, 95% of Americans own a cellphone of some kind. The … Read more

A Brief and Incomplete History of Cybersecurity

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Cybersecurity History, evolved, evolution of man, blue men, computer, cyber

Many people assume that cybersecurity is a new vector, relatively starting within the last decade. However, cybersecurity history dates back to the seventies, before most people even had a computer. We have covered hacking incidents that took place before computers, but for the purposes of this article, our timeline starts in 1971, with an experiment. … Read more

The Top 5 Cybersecurity Myths That Need to Die

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Cybersecurity Myths Man in Suit Looking at a White Wall With Two Direction Arrows Pointed To Fact or Myths

Cybersecurity myths are pervasive ideas people have about cybersecurity that weaken your cybersecurity posture. These myths often are defense mechanisms, rationalizations for apathy and inaction. It is important to dispel these myths. Otherwise, you could be opening yourself, or your business, to vulnerability. Cybersecurity Myth #1: Cybersecurity is the IT Guy’s Problem If you work … Read more

Equifax was Careless With Your Data

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Josh Henry, ,

Data breach and private personal information theft as a technology security concept as a digital thief stealing code as a computing risk idea in a 3D illustration style. Equifax

The Cost of Carelessness Is it possible to quantify carelessness? Recent news about Equifax has shown the veracity of carelessness seen in the cybersecurity department of major corporations and countries. This year alone, we have seen many companies that we trust with our personal information fail us. Because of this, the catastrophic failures of cybersecurity … Read more

ElsaGate: The Problem With Algorithms

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Elsagate concept, kids on IPads looking shocked and confused

Social Engineering can take many forms. Sometimes it’s a phone call attempting to extrapolate your mother’s maiden name. Other times it is an email attempting to gain rapport and get you to click on a sketchy link.  However, sometimes you get something much more bizarre. Something like Elsagate. In 2017, many news sources started reporting … Read more