From the Spring 2015 Issue

Small Business Big Threats: Cybersecurity in Small Enterprise EnvironmentsUnited

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

Megan Clark, Help Desk Technician, Bryn Mawr College

Cybersecurity may not seem like a priority for many small enterprise environments – after all, you’re small. Who would want to hack, phish, or spam you? But small enterprise environments face just as much, if not more, threat as large corporations. You need only look at recent news to see why small businesses may be … Read more

From the Spring 2015 Issue

The Blueprint to Cybersecurity Government Contracting: Phase One

Author(s):

Kim Harwell, National Procurement Manager, National Bid Network/GovPurchaseUnited

The road to government contracts can seem complicated, even to a seasoned professional government contractor. It does not have to be that way. In this article I will attempt to simplify government contracting business development and explain its initial phases honestly and simply. Identify your capabilities by using government-recognized criteria. Capabilities statements are necessary in … Read more

From the Spring 2015 Issue

Getting Cybersecurity off the Back Burner and into the Boardroom

Author(s):

Rick Lipsey, Senior Strategic Cyber Lead, LMI

Maybe it was the Sony hack, with corporate executives initially bowing to hacker demands while trying to recover from a multi-million dollar virtual smash-and-grab. Maybe it was the compromise of the Navy network and the resulting necessity of a task force to assess and shore up their defenses. Maybe it was the loss of 80 … Read more

From the Spring 2015 Issue

A SHOPPER’S GUIDE TO CYBER LIABILITY INSURANCE

Author(s):

Holly Winger, Esq., , Brenner, Saltzman & Wallman LLP

As the insurance specialist at Brenner, Saltzman & Wallman, I have reviewed a variety of insurance policies for clients with cybersecurity needs. Some host websites for marketing commercial real estate; others develop software to assist hospitals with monitoring patients for serious chronic conditions, or coordinate billions of credit transactions for retailers. These policies came to … Read more

From the Spring 2015 Issue

The Problem of Attribution in Cyber Attacks: The Sony Example

Author(s):

Ira E. Hoffman, Esq., Of Counsel, Butzel Long

At Fort Sumter, Union troops quickly identified the forces that were bombarding them as newly minted Confederate artillery. Similarly, at Pearl Harbor, the U.S. Navy immediately identified Japan as the source of the bombing raid because of the unmistakable markings on the low-flying aircraft overhead. In attacks involving conventional warfare, “attribution,” or the identification of … Read more

From the Spring 2015 Issue

Looking to Make Your Leap: Protecting Yourself from Threats and Breaches in the Cloud

Author(s):

Vaughan Emery, President & CEO, CENTRI Technology

More businesses are moving their data to the cloud, due to its many attractive benefits: lower capital and operational overhead, faster and more efficient scalability, and increased flexibility, to name a few. According to a RightScale study,1 87 percent of businesses surveyed have migrated some or all of their communications and IT infrastructure to the … Read more

From the Spring 2015 Issue

How Connected Is Too Connected? Cybersecurity for a Fully Networked World

Author(s):

Darin Andersen, Chairman & Founder, CyberTECH

The Internet of Things (IoT) has become one of the hottest topics among security and privacy experts in the last two years. In October 2013, when CyberTECH produced “Securing the Internet of Things,” the first “think tank” event on the topic, most people where just coming to terms with what the IoT was and what … Read more

From the Spring 2015 Issue

The Evolution of Information Security, Part One

Author(s):

Will Janssen, Business Development Director, Signals Defense

In 1980 Alvin Toffler famously declared that there are three waves of civilization – Agricultural (lasted centuries), Industrial (lasted decades), and the Information Age (now).1 Each new wave pushes the preceding wave aside. Information security operates in the Physical, “Wired” IT (information technology), and Radio Frequency (RF) operational domains. So, in a similar vein to … Read more

From the Spring 2015 Issue

Defense in the Age of Cyber-Warfare: the Cyber Security Forum Initiative

Author(s):

Amanda Fortner, Managing Editor, United States Cybersecurity Magazine

Paul de Souza was the Chief Security Engineer for AT&T when he started noticing that the cyber-attacks he saw out in the field were changing, transitioning from what we think of as “traditional” cybercrime – done for money, information, or just “the lulz” – to something far more potent: attacks that were political in nature, … Read more