From the Summer 2024 Issue

Data Privacy: Regulations, Risks & Practicing Good Cybersecurity Hygiene

Author(s):

Mathew Scott, MCFE, Vice President, Equipment Consulting, J.S. Held

Introduction In a world that revolves around the collection and use of various forms of data, continuously assuring the  privacy of data being collected and stored is a major factor in cybersecurity hygiene, i.e. habitual practices for ensuring the safe handling of critical data and for securing networks. Managing the privacy of one’s data includes … Read more

From the Summer 2024 Issue

Digital Pandemics: Are They Now A Thing?

Author(s):

Mark Cunningham-Dickie, Senior Incident Responder, Quorum Cyber

Merriam-Webster’s Dictionary defines a pandemic as an “outbreak of a disease that occurs over a wide geographic area (such as multiple countries or continents).” The recent COVID-19 outbreak is an example of a pandemic with which the world is now unfortunately familiar. If the word “disease” is exchanged with the term “ransomware attack,” then the … Read more

From the Spring 2024 Issue

Brown Paper Packages Tied Up With Cyber – the Consumer Package Goods Industry and Cybersecurity

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

introduction A doorbell rings, a text message arrives- a package has been delivered to a front porch or loading dock. The Consumer Packaged Goods (CPG) industry delivers a wide range of products sold to consumers – safely, reliably, and routinely – from grocery stores to department stores. The CPG industry comprises businesses involved in producing, … Read more

From the Spring 2024 Issue

Microsegmentation’s Role in Compliance: Meeting Regulatory Requirements

Author(s):

Larry Letow, CEO, U.S., CyberCX

Microsegmentation's Role in Compliance

Introduction In today’s interconnected world, regulatory compliance has become a top priority for organizations across various industries. Businesses must adhere to an ever-growing list of laws and regulations designed to protect sensitive data and maintain the security and privacy of customers and stakeholders. One crucial technology that has emerged to assist organizations in achieving regulatory … Read more

From the Spring 2024 Issue

Shielding Projects: Cybersecurity Strategies for PMOs

Author(s):

Rahul Yadav, Founder & CEO, Feasti

In this digital era, organizations face cyber threats with severe consequences. These threats are primarily due to remote working, the usage of unsecured devices or the use of outdated antivirus software. An effective cybersecurity strategy involves risk assessment for effective resource allocation. Moreover, security systems such as encryptions and firewall software stop unauthorized access. Project … Read more

From the Spring 2024 Issue

The Evolving Dynamics of Product and Operational Technology Security Within the Semiconductor Industry

Author(s):

Krishna Chaitanya Tata, Operational Technology Cybersecurity Leader, IBM

Krishna Tata-Spring 2024

Introduction Security within products is the need of the hour across manufacturing organizations, more so within semiconductor manufacturing. Secure by Design is an imperative that organizations are adopting very rapidly. This is very critical for the manufacturing industry as it is the most targeted industry for cybersecurity attacks in the last year. The graphic below … Read more

From the Spring 2024 Issue

What’s Next for CMMC 2.0?

Author(s):

John Kerber, Cybersecurity Assessor, ArCybr

Lauren Beward, Senior Cybersecurity Specialist/ Business Development Manager, ArCybr

What's Next for CMMC 2.0?

How to Ready Your Organization for Forthcoming Implementation Since 2020, the Defense Industrial Base (DIB) has waited for the implementation of the Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC) program anxiously wondering what it means for the contracting community and the future of defense acquisitions.  CMMC will begin implementation by January 2025, so … Read more

From the Spring 2024 Issue

Cracking the Code: Leveraging Deep Learning to Revolutionize Cyber Threat Intelligence

Author(s):

Gaurav Sharma, Director of Operations, Chetu

Cracking the Code: Leveraging Deep Learning to Revolutionize Cyber Threat Intelligence

Hackers and nation-state cybercriminals pose a growing threat to the security of our digital world. No one, from individuals to multi-national corporations to governments, is immune from cyberattacks like data breaches, ransomware attacks, and targeted intrusions. The World Economic Forum’s Global Risks Report for 2024 ranks cyberattacks as a top five global risk, right after … Read more

From the Winter 2024 Issue

,

The Unintended Consequences of Connectivity: How a Zero Trust Approach Can Shrink the Attack Surface

Author(s):

Tina Gravel, SVP Global Channels and Alliances , Appgate

Robert Metcalfe, co-inventor of Ethernet and considered one of the founding fathers of the modern Internet, is renowned for many things, but perhaps none more so than his namesake law: Metcalfe’s Law. Metcalfe’s Law was initially presented in 1980 to describe the intrinsic value of a telecommunications network and has since been popularized as ‘The … Read more