From the Fall 2017 Issue

Q&A Interview with Zane Lackey of Signal Sciences

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Signal Sciences develops a web protection platform that provides comprehensive threat protection and security visibility for web applications, microservices, and APIs on any platform. To answer some pertinent questions for our readers about emerging trends in security and DevOps, United States Cybersecurity Magazine conducted a Question & Answer interview with Zane Lackey, Signal Science’s co-founder … Read more

From the Fall 2017 Issue

Your Web Applications are Under Attack: Are You Ready?

Author(s):

James Everett Lee, Chief Operating Officer, The Identity Theft Resource Center

John M. Holt, Founder & CTO, Waratek

On a day in June, the year 2017 became another year r the record books – six months early. According the non-profit Identity Theft Resource Center C), publically reported data breaches exceed ’s record pace by as much as 80 percent in sectors s Financial Services. As of September 1st, only vernment/Military category was behind … Read more

From the Fall 2017 Issue

Cybersecurity Morbidity and Mortality Conferences

Author(s):

Chris Castaldo, Senior Director of Information Security, 2U

Current cybersecurity paradigms are not adequately supporting the global information technology community. Billions of sensitive records are compromised each year, data is held for ransom and people’s lives are put at risk. Despite numerous well-publicized failures, 2017 has been a banner as measured by the volume of venture capitalist funding for cybersecurity startups . It’s … Read more

From the Fall 2017 Issue

You Build It, You Secure It

Author(s):

Barbara Bouldin, Director of Technologies Research, SJ Technologies

John Willis, Senior Director, Global Transformations Office, Red Hat

Leading to DevOps In 2006 Werner Vogels, Amazon’s CTO, said in an interview with the Association for Computing Machinery (ACM) that developers at Amazon don’t throw software over the wall. His famous quote was “You build it, you run it”. This simple phrase became a battle cry for the DevOps movement.1 In 2017, the process … Read more

From the Fall 2017 Issue

Human Machine Teaming

Author(s):

Daren Dunkel, Manager, Enterprise Sales, Amazon Web Services

There is a myriad of companies boasting about solutions incorporating Machine Learning (ML) or Artificial Intelligence (AI). Advertising resonates; the public is enamored with ML and AI. 60 minutes recently ran a feature story on AI the piece emphasized the benefits brought to humanity by AI across a broad spectrum ranging from medicine to manufacturing. … Read more

From the Fall 2017 Issue

from the {EDITOR-IN-CHIEF}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, On October 4th, 1957, the Soviet Union launched the world’s first man-made earth satellite, Sputnik 1. The American public was shocked by what appeared to be a triumph of Soviet engineering, and further dismayed by the televised, and spectacular, failure of the the American Vanguard Test Vehicle 3 launch vehicle two months later. Blame … Read more

From the Fall 2017 Issue

from the {PUBLISHER}

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Karen Austin

Greetings, Welcome to our 5th year of publishing the United States Cybersecurity Magazine! We would like to thank all of our supporters; our members, sponsors and contributors alike. My staff and I are working diligently to bring up-to-date information to the foreground. Just when it did when we started publishing the Magazine, our release coincides … Read more

From the Summer 2017 Issue

Security for College Freshmen

Author(s):

Christopher Cerne, , Focal Point Technologies

INTRODUCTION  Graduating high school and attending college is a huge step for many students that grants new independence. Before starting the fall semester, many have already been briefed about the don’ts of living on campus: don’t do drugs, don’t fail classes and don’t do anything stupid. Unfortunately, there’s an important topic that’s often neglected: Internet … Read more

From the Summer 2017 Issue

Passport to the Future: A Secondary School Cyber Education Case Study

Author(s):

Owen Haiber, Student,

Steve Morrill, CIO & Director of Cyber Science, Loyola Blakefield

Developing and maintaining a cyber-capable workforce is a significant challenge for the United States. Currently, a significant gap exists between the demand for skilled cybersecurity professionals and the number of such people being produced by American talent pipelines. The cybersecurity job market, according to a joint report by Frost & Sullivan and (ISC)2, will see … Read more

From the Summer 2017 Issue

Developing Cybersecurity Leadership – From Art to SCIENCE

Author(s):

Sallie Sweeney, Director/Tech Enablement, KPMG

Finding cyber leaders who have the right amount of technical depth, strength of character, dedication to the mission, and loyalty to the team is like finding a needle in a haystack. Traditional leadership development curricula and frameworks need to address this gap to prepare our future cyber leaders. Cybersecurity teams are often managed by someone … Read more