From the Winter 2014 Issue

Security in a Mobile World

Author(s):

James Screven, Staff Reporter,

Defining the Problem  As the workplace continues to transform and workers continue to seek out non-traditional work spaces, employees will increasingly work more from mobile devices. Laptops, tablets, hybrid convertibles (laptop/tablet) and smartphones have liberated us from the cubicle, while corporations have benefitted from this mobile device revolution through increased productivity. Mobility, albeit liberating, brings … Read more

From the Winter 2014 Issue

CYBER INSURANCE

Author(s):

Gordon M. Mumpower, Jr., CPCU, MBA, President, Commercial Insurance Managers Inc.

Security systems are installed to prevent hackers from unauthorized access into computer networks. Hacking is prevalent by individuals who are employed within or outside companies, groups from around the world, teenage amateurs, sophisticated techies, and your spouse late at night. You purchase the best technology from the smartest and innovative vendors to protect your company … Read more

From the Winter 2014 Issue

IMPACT OF AN IA PROGRAM FROM THE NSA: A STUDENT’S PERSPECTIVE

Author(s):

Daren Dunkel, Manager, Enterprise Sales, Amazon Web Services

Today’s headlines feature stories describing the acceleration and sophistication of organized cyber crime and State sponsored military and industrial espionage. Numerous universities, Think Tanks, businesses, and blogs research the topic and track the latest attacks to suggest countermeasures (defenses) to targeted individuals and organizations. Verizon Corporation has been publishing a Data Breach Investigations Report (www.verizonenterprise.com/ … Read more

From the Winter 2014 Issue

Small Businesses: The Challenges of Securing Networks Without an IT Staff

Author(s):

Paul Ihme, , Visionist, Inc.

Small businesses play a vital role in America’s economy, employing more than 50% of the working population1. As a business grows, so does the volume of data critical to its operation. Given this correlation, how does a growing business secure their critical data (client information, personnel records, etc.) without investing overwhelming amounts of money for … Read more

From the Winter 2014 Issue

Building a Digital Nation through Educational Strategies – A Perspective

Author(s):

Leslie Grove, STEM Bridge Coordinator, National STEM Consortium

The National STEM Consortium (NSC) is a collective of ten community colleges in nine states developed to create and implement five, nationally portable, industry certifications. The certifications include Cyber Technology, Composite Materials, Electric Vehicle Technology, Environmental Technology and Mechatronics. The National STEM Consortium also delivered the STEM Bridge, a two part program established to increase … Read more

From the Winter 2014 Issue

Cyber Attacks Aimed at First Responders

Author(s):

Alan S. Tilles, Esquire, Attorney, Shulman Rogers

Best Practice Checklist Developed for PSAP Lines to Minimize Risks If you are a regular reader of this magazine, you are well aware of the problems that denial of service (DoS) attacks can have on a business or an individual. The dangers of cyber attacks on utilities has been written about and discussed over and … Read more

From the Winter 2014 Issue

On the Convergence of Electronic and Cyber Warfare

Author(s):

Anthony J. Stephens Sr., Chief Technology Officer, Cybersecurity Business Sector, The MIL Corporation

Integration of Cyber and Electronic Warfare capabilities has emerged as a principal concern for the U.S. Military. The Air Force, Army, and Department of the Navy are all concerned with developing technologies that will enable Cyber and Electronic Warfare operations from common platforms. The Army has already begun to incorporate, what they’re calling, Cyber Electromagnetic … Read more

From the Winter 2014 Issue

from the{PUBLISHER}

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Karen Austin

Greetings,  Welcome to our 2014 Winter issue of the United States Cybersecurity Magazine! We are a quarterly publication, print and digital with realistic page turning featuring articles, stories and advertisements pertaining to all aspects of Cyber ranging from vulnerability to prevention to protection. The year is 2014. We are living in a whole new culture. … Read more

From the Fall 2013 Issue

Loyola Blakefield Cyber Security Team Wins World Title!

Author(s):

Robert J. Robinson, M.S., , Loyola Blakefield

The Loyola Blakefield Cyber Security team took part in the 2013 Global Cyberlympics Challenge (cyberlympics.org). The competition was open to high school students from across the globe and after a few months of qualifying rounds, the Dons emerged from the finals as world champions. With the recent success of the team, we take a look … Read more

From the Fall 2013 Issue

Companies are Unprepared to Defend Against Cyber Threats,

Author(s):

Protiviti, ,

CIOs are assuming more strategic roles based on evolving risks and opportunities.  Despite broad recognition that cyber threats are more prevalent than ever before, a large number of companies are not adequately prepared to respond to a data breach or IT security crisis, according tofindings from the 2013 IT Security and Privacy Survey byglobal consulting … Read more