From the Fall 2014 Issue

Why Your Business Should Use Two-Factor Authentication

Author(s):

Greg Gunther, Software Engineer, Visionist, Inc.

A 2011 study by University of Cambridge computer security researcher Joseph Bonneau uncovered a shocking reality. Bonneau compared two password databases leaked from popular websites (Gawker and rootkit.com.) He discovered that over 31% of users who had an account on both sites reused the same password1. Equally troubling is the recent news that a Russian … Read more

From the Fall 2014 Issue

from the{PUBLISHER}

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Karen Austin

Greetings, Welcome to our 2014 Fall issue of the United States Cybersecurity Magazine!   This issue marks our one year anniversary with a timely release for National  Cybersecurity Awareness Month. The United States Cybersecurity Magazine takes our shared responsibility seriously. We collaborate with academia institutions, Cybercrime fighting advertisers, Cybersecurity professionals and experts in the private sector … Read more