ProcessBolt

Department of Defense (DOD) Cybersecurity Service Providers (CSSPs): A Unique Component of DOD’s Defense–in–Depth Strategy

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Business Woman Suit on Computer Cybersecurity DOD

An effective cybersecurity posture is achieved when there is confidence that information and information systems are protected against attacks through the application of security services in such areas as availability, integrity, authentication, confidentiality, and non-repudiation…

From the Spring 2018 Issue

,

Aberdeen Proving Ground Speaks on Cybersecurity

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

Feature image APG

  The trust put into any network is reliant on three main components: reliable hardware, strong software, and capable, aware people. Network trust, whether implicit or direct, is important for holding the fabric of any infrastructure together, especially during periods of distress or danger. The significant need for network trust especially applies to the cyber-realm, … Read more

Social Media Data Exploitation

Author(s):

Caleb Townsend, Staff Writer, United States Cybersecurity Magazine

A man looks through graphs and charts of data exploitation in a futuristic black and grey room.

Former data analytics contractor Christopher Wylie blew the whistle on an independent company for harvesting the Facebook information of more than 50 million people in the United States, resulting in one of the most…