From the Fall 2024 Issue

From the Publisher

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Greetings! Welcome to the Fall 2024 issue of the United States Cybersecurity Magazine!  As always, we’d like to take a moment to thank our supporters, members, sponsors, contributors, and everyone else who makes the magazine possible.  All of us here at the United States Cybersecurity Magazine remain committed to bringing you, our readers, the best … Read more

From the Fall 2024 Issue

Guide For Implementing Robust SAP Security

Author(s):

Christoph Nagy, CEO, SecurityBridge

Guide for Implementing Robust SAP Security

Cybersecurity has become one of the chief concerns for organizations worldwide. Enterprise systems, now ubiquitous in business, call for robust security measures. SAP, the preferred enterprise system, plays a significant role in business operations. With 99 of the 100 largest companies in the world being SAP customers, hackers have focussed on this enterprise platform juggernaut. … Read more

From the Fall 2024 Issue

Your Guide to SAP Security: Its Importance and Best Practices

Author(s):

Christoph Nagy, CEO, SecurityBridge

A Guide to SAP Security

In today’s digital age, cybersecurity has become a paramount concern for organizations across the globe. Among the various enterprise systems that require robust security measures, SAP (Systems, Applications, and Products in Data Processing) stands out due to its critical role in business operations, with 99 of the 100 largest companies in the world being SAP business applications … Read more

From the Fall 2024 Issue

Strategic Integration of Cybersecurity in Digital Transformation: Ensuring Resilience and Growth

Author(s):

Dr. Michael C. Redmond, PhD, Founder and CEO, Redmond Worldwide

Digital Tranformation

The Risk of Implementing Digital Transformation Without Cyber Security Considerations Is High In an era where digital transformation is pivotal for organizational growth and efficiency, neglecting cybersecurity can pose significant threats. As businesses increasingly integrate digital technologies into their operations, the potential for vulnerabilities multiplies. Without a robust cybersecurity framework, these vulnerabilities can be easily … Read more

From the Fall 2024 Issue

What To Know About Nation State Actors and Cybersecurity Threats

Author(s):

Craig Watt, Threat Intelligence Consultant, Quorum Cyber

According to the United Nations, the world witnessed a significant rise in violent conflicts in 2023 that reached unprecedented levels not seen since World War II. This increase in global tensions continues to impact the cybersecurity landscape profoundly. States primarily responsible for these developments are known as the ‘Big Four’, namely Russia, China, Iran, and … Read more

From the Fall 2024 Issue

How to AI-Protect Critical Energy Infrastructures Against Cyberattacks

Author(s):

Ashish Kumar, Assistant Vice President, Chetu

How to AI-Protect

As our technology becomes more expansive, it can get more complicated to cover all points of vulnerability.  According to Sophos, ransomware attacks have affected 67 percent of energy businesses so far this year, the same percentage as in 2023.. Cybercriminals attempted to compromise the backup systems of 98 percent of the companies that were impacted … Read more

From the Fall 2024 Issue

Multi-Party Computation: A Double-Edged Sword for Cybersecurity

Author(s):

Alex Haynes, CISO , IBS Software

Multi-party Computation

In the digital age, data is king, driving decisions, shaping experiences, and demanding robust security. However, collaboration often necessitates sharing this valuable asset, raising privacy concerns. Multi-Party Computation (MPC), a cryptographic innovation, offers a solution. It empowers multiple parties to jointly analyze data while keeping their individual contributions confidential. Rooted in the foundational work of … Read more

From the Fall 2024 Issue
From the Spring 2022 Issue

Information Warfare and Government Policy: Creating a Holistic U.S. Cyber Posture Through Cyber Survivability

Author(s):

Jessica Trombley-Owens, Vice President, System & Mission Engineering, PLEX Solutions, LLC

The Next Pearl Harbor The former director of the CIA and once Defense Secretary, Leon Panetta, warned of the possibility of a “cyber-Pearl Harbor”. More specifically he referenced the use of both cyber and physical attacks on key military and critical infrastructure systems that would result in grave detriment to the U.S. and that the … Read more

From the Fall 2024 Issue
From the Spring 2022 Issue

Social Cybersecurity: Protecting the Cognitive Domain from Hacking

Author(s):

Richard Benack, Principal Investigator, Hiperformance Security

When we traditionally discuss the term “cybersecurity”, we think in terms of protecting computer systems and the data that resides in them. We rarely think of protecting the people who manage this technology and its associated data. Coming from the intelligence world, it was taught to assume that the weakest link in any system or … Read more