From the Spring 2017 Issue

It’s Not the Breach, It’s the Data: A Case for Deterrence by Denial

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

In his 1935 book, War is a Racket1, retired Marine Corps Major General (and two-time Medal of Honor recipient) Smedley Butler2 discussed the financial incentives and commercial benefits that lead nations to engage in armed conflict. Modern day motivations are no different. Verizon reported that, in 2016, “89% of breaches had a financial or espionage … Read more

From the Spring 2017 Issue

Security Through Inclusion

Author(s):

Gary Merry, CEO, Deep Run Security Services, LLC

Larry Letow, CEO, U.S., CyberCX

It’s not the number of people in your security department, but the number of departments into security, that will make you secure. Creating a secure business is not about replacing part of your business with security functions, it’s about integrating security into business operations, as with any other business function. It’s certainly not about believing … Read more

From the Spring 2017 Issue

INDEPENDENCE & OBJECTIVITY: Fundamental Best Practices for Cybersecurity Assessments

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

Cyber professionals generally know one thing – the cyber environment is constantly shifting. New business requirements, end-user needs and technologies change. New devices and applications create or remove vulnerabilities on a daily basis. Attackers respond and adapt as they seek to find exploitable weaknesses within the environment in order to reach an organization’s data. As … Read more

From the Spring 2017 Issue

from the{EDITOR-IN-CHIEF} 

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, Boy, the hits just keep on coming, don’t they? No sooner has the dust settled on the last well-publicized breach, attack or vulnerability, than the next one pops up in the headlines. As the doxxing of the Democratic National Committee (DNC) by foreign hackers began to fade from the American collective consciousness, we were … Read more

From the Spring 2017 Issue

from the{PUBLISHER}

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Karen Austin

Greetings, Welcome to the Spring 2017 issue of the United States Cybersecurity Magazine. As always, I would like to thank our sponsors, members and our contributors for the continued support that makes the magazine possible. Next, it’s important to acknowledge the United States Cybersecurity Magazine staff for their dedication and hard work in producing a … Read more

From the Winter 2017 Issue

Combating Malicious DarkNet Actors with Cyber HUMNIT The DarkNet – Why It Matters to Everyone

Author(s):

Ed Alcantara, Chief Cyber Intelligence Officer, BLACKOPS Cyber

The DarkNet – Why It Matters to Everyone  Think of the Internet as an iceberg. The Internet we use every day represents only 4% of the total Internet. The visible part is indexed and searchable by major search engines like Google and Bing. Lurking below the surface is the remaining part of the Internet called … Read more

From the Winter 2017 Issue

Asymmetrical Hybrid Warfare The Most Significant World Event of This Century Cybersecurity: Why We Can’t Get It Right As Attacks, Breaches and Massive Theft Worsen

Author(s):

Anthony M. Chapa, Assistant Director and Chief Technology Officer, retired, United States Secret Service

Eric L. Qualkenbush, Director, Office of Central Cover; Director, Training and Education, retired, Central Intelligence Agency

T. Casey Fleming, Chairman and CEO, BLACKOPS Partners Corporation

The U.S. is Losing the Cybersecurity Battle  Cybersecurity is the most important and least understood agenda item for senior leadership and staff in every sector – business, government, the military, and academia. While we continually increase spending on failed cybersecurity strategies, the United States continues to lose the battle by a wider margin each year … Read more

From the Winter 2017 Issue

Attributing Cyber Attacks: The Way Ahead

Author(s):

Matthew C. Kurnava, MA Homeland Security/Cybersecurity,

An Election Hacked? Much attention has been paid to U.S. intelligence community (IC) reports attributing cyber-attacks against the Democratic National Committee (DNC) and the Republican National Committee (RNC) to a foreign government. The reports state that the Russian government stole information from DNC email accounts in order to influence the U.S. presidential election.1 Despite the … Read more

From the Winter 2017 Issue

Emerging Challenges: Wearable Fitness Devices, IoT and Cybersecurity

Author(s):

Shari J. Fagen, Esq., ,

Health and Fitness Devices Lead to New Risks  Wearable, IP enabled devices in the health and fitness industry range from simple fitness trackers for health enthusiasts to smart apparel that helps optimize athletes’ performance to health monitors and medical devices designed for personal and clinical use. These devices have the potential to radically improve human … Read more