From the Fall 2018 Issue

Modern Data Security: Worse Than you Think

Author(s):

Dr. Edward Amoroso, CEO, TAG Cyber

Amoroso-article-header

Imagine that under some bizarre set of circumstances, a local high school football team is forced to compete against the New England Patriots. Imagine further that the victory stakes for these teenagers are enormous, perhaps even life or death. Let’s complete this nightmare situation with an understanding that the NFL team will not let up … Read more

From the Fall 2018 Issue

SCANNERS and CONSULTANTS and PEN TESTS Oh My!

Author(s):

Caroline Wong, Chief Strategy Officer, Cobalt

Caroline-Wong-article-header

In a world with so many AppSec solutions, it can be tricky to decipher your options. For software security testing alone, there are several different options and hundreds of tools to choose from. This article looks at three of the main security testing options available: scanners, consultants, and Pen Testing as a Service. 1. Scanners … Read more

From the Fall 2018 Issue

The Next Generation of Defensive Cyberspace Operators

Author(s):

Cesar Pie, Strategist, Defensive Cyber Solutions Branch

Clinton Hackney, Strategist, Defensive Cyber Solutions Branch

Defensive Cyberspace Operations

Introduction Whether internal or external to the Department of Defense Information Network (DODIN), passive and active Defense Cyberspace Operations (DCO) are Cyberspace Operations (CO) intended to protect and defend the Department of Defense (DOD) or other friendly cyberspace from adversary actions. A key characteristic of DOD’s DCO is the construct of active cyberspace defense. Active … Read more

From the Fall 2018 Issue

Compliance: Complexity to Simplicity

Author(s):

Ryan Brady, Cybersecurity Analyst, ProObject

compliance header

Simplifying NIST SP 800-171 Compliance Process Since the contracting community has grown substantially, it also has led to a series of high profile breaches. These breaches involved the exfiltration of government data from contractors who were victims of hacks or insider threats. Incident response and forensics usually find the contractor was not updating systems regularly … Read more

From the Fall 2018 Issue

What’s the Big Hurry? The Urgency of Breach Notification

Author(s):

Ellen Cornelius, J.D., J.D., The Center for Health & Homeland Security

bigstock-Security-Breach-Cyber-Attack-C-129175730.jpg

Globally, about 5 million data records are lost or stolen each day. For each theft, consumers spend an average of 20 hours and $770 to attempt to rectify their losses. Individuals’ reputations suffer, sometimes permanently. Consumers should take action after they are notified of a data breach because there is a good chance that criminals … Read more

From the Fall 2018 Issue

Maryland’s Landmark Legislation: Cybersecurity Now More Attainable for Small Business

Author(s):

Mike Binko, CAMI Board Member - Policy & Legislative Affairs | Chairperson, StartUp Maryland | Founder & CEO

MD CAMI Heade

It is no secret that most small businesses nationwide are vulnerable to cyber-attacks, and fortunately for Maryland, stakeholders wanted to do something about it. Championed by elected officials – both Republicans and Democrats – with support from the Cybersecurity Association of Maryland, Inc. (CAMI), the Better Business Bureau (BBB) of Greater Maryland, the Maryland Department … Read more

From the Fall 2018 Issue

NYDFS Cybersecurity Regulation: Panic or Celebration?

Author(s):

Dr. Jason Edwards, Director of Cybersecurity Strategy and Planning, USAA

Griffin Weaver, Senior Legal Counsel, Dell Technologies

edwards-weaver-header-image

While U.S. regulators typically issue cybersecurity guidance instead of strict cybersecurity regulations, the New York Department of Financial Services (NYDFS) broke the mold by issuing the most comprehensive and prescriptive state cybersecurity regulation (23 NYCRR 500)…

From the Fall 2018 Issue

from the {Editor-in-Chief}

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, 2018 marks the 15th anniversary of National Cyber Security Awareness Month (NCSAM), which is observed every October. NCSAM, a collaborative effort between government and industry, is intended to help ensure that every American has the resources needed to stay safer and more secure online. The 2018 NCSAM will focus on consumer cyber safety, recognizing … Read more

From the Fall 2018 Issue

from the {PUBLISHER}

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Greetings, Welcome to the Fall 2018 issue of the United States Cybersecurity Magazine! As always, we’d like to take a moment to thank our supporters, members, sponsors, contributors and everyone else who makes the magazine possible. All of us here at the United States Cybersecurity Magazine remain committed to bringing you, our readers, the best … Read more