From the Summer 2017 Issue

Is There A Cybersecurity Labor Shortage or Vision Deficit?

Author(s):

Gary Merry, CEO, Deep Run Security Services, LLC

To understand the status of cybersecurity today, think of it as a young mountain that has formed atop the tectonics of business and technology. The mountain has grown explosively, pushed by the upwelling of industry needs; as the peak elevates, instead of a broader and more secure plateau, it provides less foundation as it loses … Read more

From the Summer 2017 Issue

A Case for Collaboration

Author(s):

Chris Castaldo, Senior Director of Information Security, 2U

In my many years of working in cybersecurity, I’ve found the only thing that can truly secure an organization is collaboration. The most important part of “people, process, technology” is the people. No one in their right mind would tell you it’s possible to prevent 100% of breaches — but, through powerful internal and external … Read more

From the Summer 2017 Issue

Penetration Testing Helps Federal Agencies Explore the Art of the Possible

Author(s):

George Berkheimer, Staff Reporter, United States Cybersecurity Magazine

In two separate cybersecurity attacks in recent years, hackers using stolen third-party vendor credentials managed to harvest debit and credit card information from 160 million combined Home Depot and Target customers. The retailers took a major hit to their reputations, not to mention their bottom lines: $300 million and counting for settlements, legal fees, customer … Read more

From the Summer 2017 Issue

SOFTWARE DEFINED NETWORKING’S (SDN) IMPACT ON CYBERSECURITY

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

Our connected world has changed expectations and requirements. Only a short time ago, a mobile phone connected to an enterprise application would have been unimaginable. The network could not support it. Security would not allow it. Both have evolved. The network has dramatically increased in bandwidth while becoming much more agile. Static, fixed IP addresses … Read more

From the Summer 2017 Issue

Web Application Security: Integration or Extinction

Author(s):

Helen Korobko, Vice President of Technology Solutions, Svitla Systems

Web applications have become a primary vulnerability for modern business  Today, almost every enterprise produces, leverages, transacts business or depends upon web or Cloud enabled software. As a result, web applications have become the number one target for malicious attacks. According to Gartner, 80% of attacks target web applications.1 Often, these attacks exploited easily mitigated … Read more

From the Summer 2017 Issue

Building Resilience in an End-to-End Encryption World

Author(s):

Ed Alcantara, Chief Cyber Intelligence Officer, BLACKOPS Cyber

It can be argued that strong end-to-end encryption has been responsible for the trust that enables the internet economy that has revolutionized the way commerce is conducted, created tremendous wealth and enabled the spontaneous generation of knowledge economies across the world. Unfortunately, the same encryption technologies have created great difficulties for the law enforcement and … Read more

From the Summer 2017 Issue

REVOLUTION and EVOLUTION: Fully Homomorphic Encryption

Author(s):

David W. Archer, PhD, Principal Scientist, Niobium Microsystems and Galois, Inc.

More and more computation is being outsourced to public clouds. Cloud computers can be just as vulnerable as any other computer, putting the privacy of sensitive data at risk. As nation-state cyber weapons become increasingly available to amateur and low-level professional cyber criminals, the external threats against those cloud-based systems continue to grow. In addition, … Read more

From the Summer 2017 Issue

Opting in to Cyber Vulnerability

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Weak Nations, Asymmetric Warfare and Power Projection America’s rivals routinely employ offensive cyber operations to influence American actions and policy.  Despite claims made by pundits and the press, these are not powerful countries, and their reliance on cyber operations and asymmetric warfare betrays them as weak players on the international stage, unable to project power … Read more

From the Summer 2017 Issue

from the {EDITOR-IN-CHIEF}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

adam-firestone

Hello, If we were crying out for tangible evidence of the cost of cyber insecurity, we’d need to look no further than the headlines. (It’s always in the headlines!) On August 7th, attackers posted a video ransom note demanding $7.5 million in return for stolen HBO intellectual property. It seems that the good guys just … Read more