From the Winter 2017 Issue

Combating Malicious DarkNet Actors with Cyber HUMNIT The DarkNet – Why It Matters to Everyone

Author(s):

Ed Alcantara, Chief Cyber Intelligence Officer, BLACKOPS Cyber

The DarkNet – Why It Matters to Everyone  Think of the Internet as an iceberg. The Internet we use every day represents only 4% of the total Internet. The visible part is indexed and searchable by major search engines like Google and Bing. Lurking below the surface is the remaining part of the Internet called … Read more

From the Winter 2017 Issue

Asymmetrical Hybrid Warfare The Most Significant World Event of This Century Cybersecurity: Why We Can’t Get It Right As Attacks, Breaches and Massive Theft Worsen

Author(s):

Anthony M. Chapa, Assistant Director and Chief Technology Officer, retired, United States Secret Service

Eric L. Qualkenbush, Director, Office of Central Cover; Director, Training and Education, retired, Central Intelligence Agency

T. Casey Fleming, Chairman and CEO, BLACKOPS Partners Corporation

The U.S. is Losing the Cybersecurity Battle  Cybersecurity is the most important and least understood agenda item for senior leadership and staff in every sector – business, government, the military, and academia. While we continually increase spending on failed cybersecurity strategies, the United States continues to lose the battle by a wider margin each year … Read more

From the Winter 2017 Issue

Attributing Cyber Attacks: The Way Ahead

Author(s):

Matthew C. Kurnava, MA Homeland Security/Cybersecurity,

An Election Hacked? Much attention has been paid to U.S. intelligence community (IC) reports attributing cyber-attacks against the Democratic National Committee (DNC) and the Republican National Committee (RNC) to a foreign government. The reports state that the Russian government stole information from DNC email accounts in order to influence the U.S. presidential election.1 Despite the … Read more

From the Winter 2017 Issue

Emerging Challenges: Wearable Fitness Devices, IoT and Cybersecurity

Author(s):

Shari J. Fagen, Esq., ,

Health and Fitness Devices Lead to New Risks  Wearable, IP enabled devices in the health and fitness industry range from simple fitness trackers for health enthusiasts to smart apparel that helps optimize athletes’ performance to health monitors and medical devices designed for personal and clinical use. These devices have the potential to radically improve human … Read more

From the Winter 2017 Issue

The Difference between Data Security and Privacy

Author(s):

Mark R. Heckman, Ph.D., CISSP, CISA, Professor of Practice, Shiley-Marcos School of Engineering University of San Diego

The difference between data security and privacy

Data Security and privacy are related, but distinct concepts. That may seem obvious to many people, but relatively few can clearly explain the difference. Privacy, moreover, is impossible without data security. This idea does not work the other way around, and the reason why that is true is often missed. Without a clear understanding of … Read more

From the Winter 2017 Issue

Train Like You Fight: Cyber Workforce Alignment

Author(s):

Chad Carroll, Chief Strategy Officer, Chiron Technology Services, Inc.

Over the past few years, industry surveys have highlighted the demand for technically skilled cybersecurity professionals, exposing a fundamental workforce shortcoming. The way industry identifies, trains and validates cybersecurity skills is outdated and misaligned. If the current training paradigm continues, the workforce will not grow in a manner responsive to the threat environment, and we … Read more

From the Winter 2017 Issue

CyberUSA Building National Resilience

Author(s):

Staff Writer, , United States Cybersecurity Magazine

“It is imperative that American communities pull together on cybersecurity.” warns Tom Ridge, the nation’s first Secretary of Homeland Security and Chairman for the recently launched non-profit CyberUSA. “This is the new battlefront for both national security and economic security. That’s why we need to organize better nationally to get our private sector working together … Read more

From the Winter 2017 Issue

An Analytical Framework for Cybersecurity Assessment

Author(s):

Dr. Colonel Gabi Siboni, Founder, G. Bina Ltd.

Cyber threats have become a major problem for every organization. There are many technological solutions, defenses, a lot of advice and many advisors. Before these can be effective, an organization must be able to frame the problem. Specifically, it must understand whether its defenses can mitigate cyber risks, and whether they are effective against existing … Read more

From the Winter 2017 Issue

Cybersecurity and Small Business Survival

Author(s):

David Thomas, MCSE, Director of Technology Services, Kenneally Technology Services

The “little guy mentality” can no longer be relied upon to protect and safeguard your systems in today’s environment.  Much attention has been paid to major data breaches that have affected large corporations, United States government agencies, not-for-profits and political organizations. This attention has resulted in the allocation of significant resources, both monetary and intellectual, … Read more

From the Winter 2017 Issue

TOP 10 Cybersecurity Conference Tips

Author(s):

Paul de Souza, CSFI-CWD (Cyber Warfare Division) Founder Director, Military Cyber Professionals Association (MCPA)

As cyber security professionals, many of us enjoy attending conferences and events for a variety of reasons. No matter your intent or agenda, there are certain principles to follow that will help you get the most out of your conference experience. Perception can be reality. People observe, people talk, people share. How you are perceived … Read more