From the Spring 2014 Issue

Eliminating Threat Vectors in Cyber Attacks

Author(s):

Steve Stratton, Vice President, Business Development, COPT

Question: Can infrastructure play a positive role in your Cybersecurity program? Most often we think of infrastructure in a negative way, something we have to protect. It is the mess that we have to attempt to control through policy, procedures, technology and training. It takes a lot of different systems, network and data security components … Read more

From the Spring 2014 Issue

Reduce Risk, Train Your Workforce

Author(s):

Michael Volk, Cybersecurity Specialist, PSA Insurance & Financial Services

The threat landscape in the cyber domain has changed. A secure perimeter comprised of traditional network security devices, technologies and mechanisms is necessary but it is no longer sufficient to defend against the threats that exist in the current environment. The proliferation of Advanced Persistent Threats (APTs) executed by sophisticated adversaries has changed the cybersecurity … Read more

From the Spring 2014 Issue

Commercial Off-The-Shelf (COTS) vs. Home-Grown Software

Author(s):

John Scillieri, , Visionist, Inc.

Matthew Loff, , Visionist, Inc.

Which is more secure for your small business?  Introduction  You’ve reached a growing pain many small business owners are familiar with. As your company expanded, employees relied on free email and file sharing services, and you were content with keeping timecards and expense reports in spreadsheets. This worked well enough when you had 5 employees, … Read more

From the Spring 2014 Issue

Wireless Security: Not just 802.11 Anymore

Author(s):

Rick Mellendick, Chief Security Officer, Process Improvement Achievers, LLC

With the increase of organizations establishing wireless networks, including wireless guest networks, as well as creating Bring Your Own Device (BYOD) environments, organizations have increased their susceptibility to newer types of threats. Organizations are struggling to balance convenience with security and too often, convenience is being implemented proactively while security is being implemented reactively. When … Read more

From the Spring 2014 Issue

from the{PUBLISHER}

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Karen Austin

Greetings,  Welcome to our 2014 Spring issue of the United States Cybersecurity Magazine! The United States Cybersecurity Magazine is an intelligent, state-of-the-art magazine published quarterly in a powerful combination of print and digital, all in one integrated package. We must not ignore our enemies. We must make a full commitment to continue to find out … Read more

From the Winter 2014 Issue

Cost Effective Security Assessments in Remote Locations

Author(s):

Gabe Koss, , Pwnie Express

Imagine a large bank. It has large corporate offices in several major cities in the United States and over 1000 branch offices across the country. It even has international branches. All of these different locations mean the bank functions on a large-scale, distributed infrastructure.  Being a bank, like government institutions, they are subject to varying … Read more

From the Winter 2014 Issue

UNIQUE ISSUES IN CYBERSECURITY MERGERS & ACQUISITIONS FOR THE GOVERNMENT CONTRACTOR

Author(s):

Donald J. Walsh, Esq., Chair Government Contracting Practice Group, Offit|Kurman, P.A.

Although the economy may have been on a rollercoaster for several years, one consistent growth market has continued to be government contracting. Despite recent sequestration and budget cuts, the stability of revenues for the vast majority of government contractors has led to considerable Mergers & Acquisitions activity over the past few years. Nowhere is this … Read more

From the Winter 2014 Issue

Northrop Grumman and bwtech@UMBC Graduate First Three Companies from Innovative Cyber Cync Program

Author(s):

Marynoele Benson, , Northrop Grumman

Small-business initiative generates cutting-edge cyber technologies to meet tomorrow’s global threats  Northrop Grumman Corporation and the University of Maryland, Baltimore County’s Research Park Corporation – also known as bwtech@UMBC – hosted a ceremony this fall for the first graduating class of the Northrop Grumman-sponsored Cyber Cync Program: AccelerEyes, Five Directions and Oculis Labs. The event … Read more