From the Winter 2024 Issue

UNISQUATTING IDN HOMOGRAPH ATTACKS

Author(s):

Danny Gershman, Founder and CEO, Radius Method

Unisquatting (a portmanteau for Unicode cybersquatting) or the Internationalized Domain Name (IDN) homograph attack is a fairly new type of mechanism that builds on several other types of Domain Name System (DNS) address attacks. The typosquat (Uniform Resource Locator (URL) hijacking) attack relies on being able to register a domain name very closely resembling another … Read more

From the Winter 2024 Issue

Cyber McCarthyism – The Third Red Scare

Author(s):

Chris Pogue, Director, Digital Forensics and Incident Response, CyberCX

Cyber McCarthyism

McCarthyism, also known as the Second Red Scare, refers to the political repression and persecution of various politicians, government employees and military personnel, in an attempt to spread the fear of alleged communist and Soviet influence on American institutions and of Soviet espionage in the United States during the late 1940s through the 1950s.  After the mid-1950s, Senator Joseph McCarthy, who had … Read more

From the Winter 2024 Issue

Navigating Blockchain and Quantum Computing and Their Cybersecurity Impacts

Author(s):

Gaurav Sharma, Director of Operations, Chetu

In a dynamic industry where technological evolution is constant, staying informed about the latest advancements is crucial for businesses aiming to optimize operations and bolster cybersecurity. Embracing new technologies not only enhances functionality but also ensures the seamless integration of innovative systems. As businesses increasingly rely on secure transactions and data protection, the popularity of … Read more

From the Winter 2024 Issue

Mobile Security Research – A Massive Waste of Time

Author(s):

Brian Robison, VP of Product Marketing & Chief Evangelist, Corellium

Mobile Security Research

Mobile security research and testing have traditionally been extremely difficult and time-consuming endeavors. And most of that time is spent doing things other than the actual research. Whether searching for vulnerabilities in a mobile OS, penetration testing a mobile app, or conducting research into mobile threats and malware, all are bound by the restrictions imposed … Read more

From the Fall 2023 Issue

From the Editor-In-Chief

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, It’s easy to think of cybersecurity as a coldly logical space where the deterministic management of machines and software creates a binary reality.  Do the right thing (for values of “right” that equate to compliance with any of a myriad of frameworks), and security ensues.  Do the wrong thing, which is often perceived as … Read more

From the Fall 2023 Issue

From the Publisher

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Greetings, Welcome to the Fall 2023 issue of the United States Cybersecurity Magazine!   We would like to extend our appreciation to the numerous individuals and organizations for their contributions and sponsorships during the compilation process of this issue.  You have played a significant role in enhancing the United States Cybersecurity Magazine!  We will continue … Read more

From the Fall 2023 Issue

,

Why Cybersecurity Training is Essential for Companies in the Digital Age

Author(s):

Joanne Camarce, Director of PR Operations, uSERP

With the increase in digital technology, cybersecurity has become a vital concern for businesses of all sizes. As technology evolves, so do the methods and techniques of cyber-attacks, and without proper protection, companies can suffer significant financial and reputational losses. Cybersecurity training is no longer a nice-to-have but an essential element for any organization’s security … Read more

From the Fall 2023 Issue

How to Build Your Workforce’s Psychological Cyberdefenses

Author(s):

Dr. Shaun McAlmont, President & CEO, NINJIO

workforce psychological cyberdefenses

When cybercriminals launch social engineering attacks, they’re exploiting the psychological vulnerabilities of their victims. Phishing messages lure victims into clicking on dangerous links or downloading malware with coercive language. Other cyberattacks take advantage of victims’ curiosity by sending fake headlines, offers, and other information that’s calibrated to their interests. No matter what strategies cybercriminals deploy, … Read more

From the Fall 2023 Issue

How to Schedule a Pen Test

Author(s):

Paul Kubler, Red Team Lead, CYBRI

How to Schedule a Pen Test

A frequent occurrence in the cybersecurity world is having to scramble at the end of the year, between holidays, to get the compliance required pen test done. After all, it was probably conducted at the same time last year for the same reasons. This leads to an already overburdened staff dealing with the common holiday … Read more