From the Summer 2016 Issue

Credentialing: Making a Better Navy and a Stronger Nation

Author(s):

Matthew Stern, CompTIA,

It’s no secret that the more central communications technology becomes in the day-to-day lives of individuals, enterprises, and governments, the more cybersecurity threats have begun to proliferate. Recent news of advanced persistent threats compromising everything from big-name enterprises to government networks has led to a need for verifiably skilled cybersecurity professionals across the entire computing … Read more

From the Summer 2016 Issue

Cyber Attacks and Legal Malpractice

Author(s):

Ethan S. Burger, Adjunct Professor, Washington College of Law

Over a year ago, Citibank criticized many of the largest law firms for their reluctance to: …discuss or even [publicly] acknowledge breaches that result [ed] in the release of their clients’, employees’, and counterparts’ confidential personal data, which has frustrated law enforcement and corporate clients for several years. That frustration bubbled over in an internal … Read more

From the Summer 2016 Issue

Cybersecurity Checkup: Preventing Breaches in Healthcare

Author(s):

Joseph S. Abrenio, Vice President of Commercial Services, Delta Risk LLC

The Evolving State of Healthcare Cyber-Attacks The healthcare sector has gone from being a secondary target for threat actors to landing squarely in the bullseye. In 2015, more than 100 million healthcare records were reportedly compromised, with five of the eight largest healthcare breaches since 2010 taking place in the first six months of 2015. … Read more

From the Summer 2016 Issue

Outcome-Based Cyber Defense

Author(s):

Duane Wilson, Director of Strategic Cyber Initiatives, Sabre Systems Inc.

According to CNN Money, more than 317 million new pieces of malware – computer viruses or other malicious software – were created last year. This means nearly one million new threats were released each day. This has been the case since the Morris Worm incident of 1988, and is predicted to get worse.1 Traditional cybersecurity … Read more

From the Summer 2016 Issue

The New Top Ten in Cybersecurity: Things Have Changed Dramatically

Author(s):

T. Casey Fleming, Chairman and CEO, BLACKOPS Partners Corporation

FORGET WHAT YOU THINK YOU KNOW ABOUT CYBERSECURITY. The Internet was initially developed only as an electronic communication method. Security did not become a concern until many years later, as the Internet matured. As threats mounted, the industry’s answer was to develop new software and hardware products to defend the perimeter of the network. Each … Read more

From the Summer 2016 Issue

from the{EDITOR-IN-CHIEF}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, It’s my great pleasure and honor to accept the role of Editor-in-Chief of the United States Cybersecurity Magazine. Cybersecurity presents a challenge unique in the history of our country. Over the last forty years, a distinctly American public-private partnership has resulted in a multifaceted technological, economic, military, social, and creative boom that has transformed … Read more

From the Summer 2016 Issue

from the{PUBLISHER}

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Karen Austin

Greetings, Welcome to the Summer 2016 issue of the United States Cybersecurity Magazine.   While great leaps and bounds have been made in cybersecurity, the threat that malicious individuals and groups present to our nation is undiminished. Recent months have seen cyber-attacks of unprecedented proportions launched against the United States of America by increasingly skilled … Read more

From the Spring 2016 Issue

New Possibilities for Solving CYBERCRIME

Author(s):

-William J. "Bill" Britton, Vice President of Information Technology and Chief Information Officer, California Polytechnic State University

Combatting cybercrime is where we, as a society, find ourselves in uncharted territory.   The criminal of today does not rely on in-person interaction, but on the continually-shifting dynamics of the Internet. It is arguable that every crime involves some sort of cyber component, whether as its culminating element or an intermediary step. In either circumstance, … Read more

From the Spring 2016 Issue

Digital and Physical Security Converged: How to Achieve the Next Generation of Cyber Defense

Author(s):

Christopher Ensey, Chief Operating Officer, Dunbar Security Solutions

With more than 80 million related events occurring annually, cybersecurity is one of the biggest concerns for companies today.1 And since 55 percent of attacks in 2014 were carried out by insiders – actors with either physical or remote internal access to an organization’s systems – it is clear that cyber-attacks do not occur in … Read more

From the Spring 2016 Issue

Cyber-Physical Security for 3D Printing

Author(s):

Sharon Flank, Ph.D., CEO, InfraTrac, Inc.

Counterfeiting threatens profits, compromises brand reputation, and endangers customers. A fake bag or watch may seem like a harmless bargain, but buyers are often unaware that its profits fund organized crime or even terrorism. The dangers of counterfeit medical devices, airplane parts, and truck brakes are another matter entirely. The U.S. economy relies on intellectual … Read more