From the Fall 2023 Issue

The Myth of Cyberwarfare – The Ukraine Example

Author(s):

Alex Haynes, CISO , IBS Software

The Myth of Cyberwarefare

Over a decade ago, the front page of ‘the economist’ once had a nuclear mushroom cloud with the caption ‘Cyberwar: the threat from the internet’. A dramatic way to encapsulate the vision of how we perceived the impact of such a threat. Since then the term ‘cyberwar’ is bandied around a lot without any real … Read more

From the Fall 2023 Issue

Safe, Reliable: A Cyber Duty of Care and Standard of Practice

Author(s):

Henry J. Sienkiewicz, Faculty, Georgetown University

Safe, Reliable

As the alarm clock goes off, a drowsy hand turns on a light switch. Lights go on and lights go off – safely, reliably. Different manufacturers, different processes, same result – safe, reliable. The foundation for this safety and reliability is found in the National Electrical Code, the comprehensive set of rules that govern the … Read more

From the Fall 2023 Issue

The Vitality of Being an In-Person Cybersecurity Vendor at Cybersecurity Conferences

Author(s):

Bradford Rand, President of the Cyber Security Summit & TECHEXPO Divisions, CyberRisk Alliance

Cybersecurity Vendor

In today’s digital age, the importance of cybersecurity cannot be overstated.  As cyber threats continue to evolve and become more sophisticated, the need for robust security solutions is paramount.  While the virtual realm has provided numerous opportunities for collaboration and networking, there is still immense value in being an in-person vendor at cybersecurity conferences.  In … Read more

From the Fall 2023 Issue

Building What’s Next: Empowering Developers for the Next Generation of Smart Devices

Author(s):

Anthony Ricco, Chief Marketing Officer, Corellium

Connected smart devices and IoT applications are arguably the most influential technology that is powering the 2020s. Smart phones, connected cars, and IoT devices have completely shifted how we interact with the world. Previously offline industries, like critical infrastructure, have also begun adopting smart devices to move their operations into the future. The adoption and … Read more

From the Fall 2023 Issue

Featured CEO! Daniel Tobok, CYPFER

Author(s):

Featured CEO, Daniel Tobok

Cybersecurity has never been more important than it is now, and its importance will continue to grow as more interactions become digital. Many people in the industries’ youth had a difficult time describing what cyber meant to them; however, one man is aiming to leave a legacy in the industry that will have decades of … Read more

From the Summer 2023 Issue

From the Publisher

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Greetings, Welcome to the Fall 2023 issue of the United States Cybersecurity Magazine!   We would like to extend our appreciation to the numerous individuals and organizations for their contributions and sponsorships during the compilation process of this issue.  You have played a significant role in enhancing the United States Cybersecurity Magazine!  We will continue … Read more

From the Summer 2023 Issue

From the Editor-in-Chief

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, Cybersecurity is an interesting word.  It’s often referred to as an “industry,” yet the word evokes imagery not of a factory or a production line but of hyperintellectual technologists tackling mindbogglingly complex technical challenges, electronic ninjas dueling with electric katanas in the ether, and ever-vigilant sentinels protecting the nation from those who would do … Read more

From the Summer 2023 Issue

The Accelerators Neutralizing Global Security Threats

Author(s):

Oko Davaasuren, Senior Director, Techstars

The Accelerators Neutralizing Global Security Threats

It is fair to say that the global cybersecurity industry has become an incredibly important sector in recent years. This is largely due to the growing number of threats and attacks, amid the rise of technology-driven business and remote working practices. The global cyber landscape has seen a dramatic increase in cybercrime since the beginning … Read more

From the Summer 2023 Issue

Ease of Use and Maximum Security: What Every App User Wants

Author(s):

Ashok Kumar Padmaraju, Senior Technical Manager (IT Security), Leading Biopharma Organization

what-every-app-user-wants

The appetite for new mobile applications (apps) is growing at an exponential rate and the number of organizations incorporating them into their business models is staggering. Apps make it easier for customers to connect with a company’s products and its online platforms. Mobile apps help businesses build brand loyalty, provide insights into customer behaviors and … Read more

From the Summer 2023 Issue

Defense In Depth and DMZ WEB Server Deployment

Author(s):

Syed Taha Ahmed Jafri, Information Security Specialist,

Defense In Depth and DMZ

Introduction This article will discuss Defense in Depth (DID) in detail and minimum steps to securely deploy a Web server in DMZ for a FinTech 3-tier application. 3-TIER ARCHITECTURE In software engineering the methodology of 3-tier architecture is used to divide an application into logical boundaries. These boundaries are logical and their main benefit is … Read more