From the Fall 2024 Issue
From the Spring 2022 Issue

Information Warfare and Government Policy: Creating a Holistic U.S. Cyber Posture Through Cyber Survivability

Author(s):

Jessica Trombley-Owens, Vice President, System & Mission Engineering, PLEX Solutions, LLC

The Next Pearl Harbor The former director of the CIA and once Defense Secretary, Leon Panetta, warned of the possibility of a “cyber-Pearl Harbor”. More specifically he referenced the use of both cyber and physical attacks on key military and critical infrastructure systems that would result in grave detriment to the U.S. and that the … Read more

From the Fall 2024 Issue
From the Spring 2022 Issue

Social Cybersecurity: Protecting the Cognitive Domain from Hacking

Author(s):

Richard Benack, Principal Investigator, Hiperformance Security

When we traditionally discuss the term “cybersecurity”, we think in terms of protecting computer systems and the data that resides in them. We rarely think of protecting the people who manage this technology and its associated data. Coming from the intelligence world, it was taught to assume that the weakest link in any system or … Read more

From the Spring 2022 Issue

From the Publisher

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Greetings, Welcome to the Spring 2022 issue of the United States Cybersecurity Magazine!   As always, we’d like to take a moment to thank our supporters, members, sponsors, contributors and everyone else who makes the magazine possible.  All of us here at the United States Cybersecurity Magazine remain committed to bringing you, our readers, the … Read more

From the Spring 2022 Issue

From the Editor-in-Chief

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, Let’s be honest.  All of us in the cybersecurity community think of ourselves, more or less (and more often more than less) as technocrats.  We’re masters of that sterile domain in the ether where everything boils down to sterile ones and zeros (or qubits).  We speak in tongues, our conversations a tent-revival glossolalia made … Read more

From the Spring 2022 Issue

Making Better Cyber Risk Decisions By Architecting the Choices

Author(s):

Malcolm Harkins, Chief Security and Trust Officer, Epiphany Systems

“Victory awaits him who has everything in order. Defeat is certain for him who has neglected to take all the necessary precautions in time.” Roald Amundsen, on the South Pole. Uncertainty, chaos, and luck – why some thrive despite them all.  In the book Great by Choice, Jim Collins and Morten Hansen distill a decade’s … Read more

From the Spring 2022 Issue

Playing Offense and Defense with Drone Cybersecurity Threats

Author(s):

Kate Esprit, Cyber Threat Intelligence Analyst, MITRE

TBONE, Tesla, and Technological Threats In October 2016, U.S.-based vehicle manufacturer Tesla received some surprising news – two German security researchers had found a way to hack the company’s cars using a drone. The researchers, Ralf-Philipp Weinmann and Benedikt Schmotzle had hacked into Tesla’s systems by exploiting several zero-click vulnerabilities in the ConnMan software, an … Read more

From the Spring 2022 Issue

Human Risk in the Flow of Work

Author(s):

Travis Good, MD, Co-Founder and CEO, Haekka

The way in which work is performed has changed dramatically over the last 20 years. Digital transformation, coupled with the transition to remote work, has only accelerated over the last several years with the backdrop of Covid. Organizations today, large and small, have the herculean mandate of securing their biggest liability — remote workers and … Read more

From the Spring 2022 Issue

Getting Offensive With Your Third Parties

Author(s):

Alex Haynes, CISO , IBS Software

ah-sp22 Feature Image

Third-party onboarding today isn’t easy and with the rise in supply chain attacks, the importance of auditing and ensuring your third parties won’t impact your infrastructure from a security perspective remains a burning issue. Many companies still maintain a tick box approach when onboarding or managing third parties and mainly consist of sending out questionnaires … Read more

From the Spring 2022 Issue

7 Key Questions That Gauge the Effectiveness of Present and Future Cybersecurity Programs

Author(s):

Amit Kandpal, Director, Customer Success, Netskope

It is no secret that a well-defined, tested and implemented cybersecurity program is an essential function for the stability of business operations; however, there are many variables to consider. Rapid advances in technology have changed the dynamics of informed decision-making with the best option often being to introduce a newer technology into the market, rather … Read more

From the Spring 2022 Issue

Shifting Our Thinking from Cybersecurity to Cyber Safety

Author(s):

Stephen Cardot, CEO, President, Founder, CloudCover

Our reactive, defensive approach to IT security isn’t working − proactive de-risking is the way forward. “Disconcertingly routine.” That’s how an article in a national news publication summed up the current cyber-attack landscape after the recent discovery that Chinese hackers had breached several governments and universities around the world in a years-long campaign to steal … Read more