From the Spring 2015 Issue

Living on the Edge: Pushing the Boundaries of Cybersecurity for the Marine Corps Forces Cyber Command

Author(s):

Patric Petrie, Lead Staff Writer, SPAWAR Systems Center Pacific

Background Marine Corps Forces Cyber Command (MFCC) faces a big challenge often experienced by other cyber agencies: achieving a clear and consolidated picture of the cyberspace domain. MFCC plans, coordinates, integrates, synchronizes, and directs the full spectrum of Marine Corps cyberspace operations, including Department of Defense Global Information Grid operations and defensive cyber operations. When … Read more

From the Spring 2015 Issue

How to Win at Cyber-Chess: Leveraging Neuro Analytics in Your Cyberspace

Author(s):

Dr. Alenka Brown, President , McClure, Brown & Associates LLC

Mr. Jason Christman, MS, CISSP, PMP, Subject Matter Expert, McClure, Brown, & Associates® LLC

The cyber domain presents limitless opportunities for cyber threat actors while causing significant challenges for cybersecurity professionals. While our current time might be construed by historians as the golden age of cybercrime, it is also an age that offers new ways and means to counter these crimes. Neuro-behavior forensics is such a means, permitting the … Read more

From the Spring 2015 Issue

In 2015, It’s All about the Data

Author(s):

Eric L. Qualkenbush, Director, Office of Central Cover; Director, Training and Education, retired, Central Intelligence Agency

T. Casey Fleming, Chairman and CEO, BLACKOPS Partners Corporation

A New World  2014 taught us that massive security breaches are the new normal for U.S. companies, government agencies, and universities. Some of the most prominent were Target, Home Depot, Neiman Marcus, Apple’s iCloud, Michaels, the U.S. Postal Service, the IRS, Community Health Services, UPS, Staples, the State Department, Sands Casinos, USIS, eBay, PF Chang’s, … Read more

From the Spring 2015 Issue

Cyber Maturity It’s Time to Be Accountable for Our Own Destiny

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Security professionals are a quiet bunch. It’s rare for them to publicly discuss known vulnerabilities used to attack targeted organizations. There are many reasons for this reticence. For one, a professionally laconic demeanor is standard issue in a group for whom operational security is a way of life. For another, today’s victim may very well … Read more

From the Spring 2015 Issue

Opening the Door for Women in Cybersecurity

Author(s):

Kathleen Smith, Chief Marketing Officer, ClearedJobs.net

As an industry, cybersecurity encompasses everything from government programs to healthcare, from power plants to automobiles. It touches nearly every aspect of our lives. Cybersecurity no longer is a separate industry but one that permeates every other industry. Previously the only defensive posture we had to take was with our military, business, or intellectual property, … Read more

From the Spring 2015 Issue

Eyes on Employees: Federal Agencies’ Top Assets and Biggest Security Threats

Author(s):

Chris LaPoint, Group Vice President of Product Management, SolarWinds

Federal employees play a huge part in keeping our country running safely and efficiently, from gathering intelligence to protecting our borders to running our national parks. That said, they are also an increasing source of concern for IT security departments. In December 2014, market research firm Market Connections, in conjunction with SolarWinds, conducted a survey1 … Read more

From the Spring 2015 Issue

Calm Your Bits: Why the Internet of Things Doesn’t Have to Be a Security Nightmare

Author(s):

Chris Castaldo, Senior Director of Information Security, 2U

Industry buzzwords are a dime a dozen, but few survive the passage of time. A term that popped into our lexicon in approximately 2006, according to Google Trends, and has been gaining traction in 2014, is the “Internet of Things,” or “IoT.” “Internet of Things” and “Internet of Everything” are terms that have been given … Read more

From the Spring 2015 Issue

2015: What’s Old is New Again

Author(s):

Daren Dunkel, Manager, Enterprise Sales, Amazon Web Services

As 2015 starts, there is no shortage of articles, posts, and interviews projecting the year ahead for cybersecurity trends, attack scenarios, and countermeasures. I have reviewed numerous materials (from McAfee Labs, Trend Micro, FireEye, Websense Security Labs, Symantec, etc.) highlighting similar themes around critical infrastructure, mobile device attacks, and the evolution of hacking in general. … Read more