From the Winter 2015 Issue

Debunking the Big Bad “Cloud”

Author(s):

Kris Martel, EVP of Operations, Chief Information Security Officer, Emagine IT

There are some topics that seem to be shrouded with uncertainty and confusion and the “Cloud” is one of those topics. I was talking with a fellow CISO of a Federal Agency a few weeks back and the topic of “cloud migration” came up. Not unexpectedly, my CISO friend expressed that the biggest obstacles to … Read more

From the Winter 2015 Issue

I’m Not a Hacker, I Just Play One in the Classroom

Author(s):

Dr. Jane A. LeClair, President, Washington Center for Cybersecurity Research & Development

James L. Antonakos, Fellow, National Cybersecurity Institute at Excelsior College

Influencing Ethical Behavior by Example  Providing education in the area of information security, cybersecurity, and computer and network security poses numerous challenges. First, there is a great deal of information that must be dispensed to the learners. Second, in addition to presenting the necessary background information, there are practical skills that must be shared with … Read more

From the Winter 2015 Issue

SCHSIM: Immunizing Software Systems Against Hacking

Author(s):

Dr. Sunny Fugate, , SSC Pacific

Patric Petrie, Lead Staff Writer, SPAWAR Systems Center Pacific

The benefits of the same software used everywhere has made our systems vulnerable to criminals and nation-state adversaries alike.  Background  Software is vulnerable to cyber threats due to defects of design, development, and deployment. One of the many challenges posed by current software is balancing security and cost. In most cases the deployment and maintenance … Read more

From the Winter 2015 Issue

from the{PUBLISHER}

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Karen Austin

Greetings, Welcome to the United States Cybersecurity Magazine! The staff at the United States Cybersecurity Magazine would like to thank you for your continued support in providing solutions-oriented information along with the knowledge of the tools and technology needed to combat this cyberterrorism and cybercriminality that is taking place against our citizens and our businesses … Read more

From the Fall 2014 Issue

Maryland – Cash Investments and Tax Credits Add Up to Business Success for Cybersecurity Companies

Author(s):

Andrew L. Bareham, CPA, MST, Principal, State and Local Tax (SALT) Chair, KatzAbosch

The Internet Age has changed the business environment in the world. For instance, Silicon Valley in California has become the home to many high-tech business giants. New businesses attracted to Silicon Valley have brought high-paying jobs and with the jobs comes tax revenue for the state. With the changeover from a manufacturing economy to a … Read more

From the Fall 2014 Issue

Market Intelligence: The Key to Government Business Development

Author(s):

Kim Harwell, National Procurement Manager, National Bid Network/GovPurchaseUnited

Increasingly, every day of every week, of every month, of every year, more business is being conducted online. Federal, state and local government prime contracting, subcontracting and teaming are no exception. In fact, most government contracting opportunities and research is now available online and easily accessible. The key is to know the proper techniques and … Read more

From the Fall 2014 Issue

5 Things to Do Today to Increase the Value of Your Government Contracting Business

Author(s):

Pat Lowry, MBA, ASA, CVA, , Patuxent Valuation Group LLC

Realtors are asked for their tips on selling homes, chefs are asked for their secret spices, and cops are asked how to get out of speeding tickets. Me? I’m constantly asked what’s most important to increasing the value of someone’s business. 10 years of experience consulting with and valuing government contracting businesses – some that … Read more

From the Fall 2014 Issue

Hunting with Cyber Threat Intelligence

Author(s):

Robert S. Johnston, ,

Do the current techniques to conduct incident management and response constitute an effective counter threat operation?  In today’s threat landscape, chasing down alerts from your SEIM may not be enough to catch the most advanced threats.  Today’s Advanced Persistent Threats (APT) link sociological, psychological, and technical tradecraft together to infiltrate the  most secure networks, and … Read more

From the Fall 2014 Issue

Corporate America is Being Attacked and the Entry Vector May Be Surprising

Author(s):

Rick Mellendick, Chief Security Officer, Process Improvement Achievers, LLC

“Corporate America is under attack” has become a more regular headline with media outlets. Such reports often describe the attack and loss, but few explain why it happened and even fewer take the time to describe how not to let it happen. Even organizations focus on the attack, loss, and why the attack happened when … Read more