From the Fall 2024 Issue
From the Winter 2022 Issue

The Machine Industry and Control Systems: The National Security Risks with SCADA

Author(s):

Alan Cunningham, Independent Journalist, Truth Be Told

Alan-Cunningham

With any technological system, it can be susceptible to cyber-attacks or hacking measures by foreign or domestic actors for varying purposes. Within the United States, we have seen a large municipal city resort to pen and paper for daily tasks after a Ransomware attack, a breach of federal personnel information by hackers contracted by a … Read more

From the Winter 2022 Issue

THE U.S. ARMY C5ISR CENTER CSSP ATTAINS ISO 9001 CERTIFICATION STATUS

Author(s):

Kristi S. Halford, Founder, C3 Visionary Strategies

In its ongoing pursuit of cyber excellence that maintains the U.S. Army Command, Control, Computers, Communications, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR) Center Cybersecurity Service Provider (CSSP), a trendsetter and premier leader for the advancement of Defensive Cyberspace Operations (DCO) within the Department of Defense (DOD), the C5ISR Center CSSP has attained International Organization for … Read more

From the Winter 2022 Issue

From the Publisher

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

Greetings, Welcome to the Winter 2022 issue of the United States Cybersecurity Magazine!   As always, we’d like to take a moment to thank our supporters, members, sponsors, contributors and everyone else who makes the magazine possible.  All of us here at the United States Cybersecurity Magazine remain committed to bringing you, our readers, the … Read more

From the Winter 2022 Issue

From the Editor-in-Chief

Author(s):

Adam Firestone, Editor-in-Chief , United States Cybersecurity Magazine

Hello, Tell me that at least one of you out there in cyber land is a classic movie buff?  And no, classic doesn’t mean something that was produced by Netflix for Netflix in 2018.  Since I can hear the sound of that pin dropping , I’m forced to conclude that, once again… Lonely is the … Read more

From the Winter 2022 Issue

Blurred Lines of Working From Home

Author(s):

Adam McCullough, Senior Cloud Solution Architect, Microsoft

The New Normal Working from Home (WFH) has been around for a long time. It wasn’t readily available to everyone and there were always whispers of “working from home” and what the employer thought it meant. Companies didn’t trust their employees if they couldn’t see them. You were often judged by the number of hours … Read more

From the Winter 2022 Issue

A Comprehensive Approach to Sustain and Secure a Remote Workforce Strategy in 2022

Author(s):

Glenn Axelrod, M.S, CISA, CISM, CRISC, HKA Technology Solutions, L.L.C.

WHY ASKING EMPLOYEES TO RETURN TO THE OFFICE IS MISSING THE MARK (AND HOW YOU CAN FIX IT) Neglecting to implement or continue a remote work option and reap its benefits can result in employees leaving an organization, possibly working for a competitor who does implement one. “If you do not allow flexible or remote … Read more

From the Winter 2022 Issue

Tapping into the Crowd: User Verification Using Social Media

Author(s):

Gergo Varga, Senior Content Manager/ Evangelist, SEON

The need for user verification to prevent fraud and protect your company from cybercrime is increasingly being understood as urgent.  Certain sectors, including eCommerce, banking and FinTech, recognized early on the importance of knowing exactly what company it is and who it is that wants to become a customer/client of theirs. Some local and regional … Read more

From the Winter 2022 Issue

Back to Basics: The Vulnerabilities You’re Overlooking

Author(s):

Gabrielle Hempel, Systems Engineer, RSA Security

By now, data breaches are commonplace. Almost every day, there seems to be a new one—it has become a regular occurrence. Often, these breaches involve ransomware, which has become a much larger problem in recent years. Ransomware is concerning because it preys upon both Information Technology (IT) and Operational Technology (OT), which is disruptive to … Read more

From the Winter 2022 Issue

What is PtaaS?

Author(s):

Caroline Wong, Chief Strategy Officer, Cobalt

What is PtaaS

Ransomware and other digital attacks continue to grow in frequency for companies around the world. With this, demand for cybersecurity services continues to grow as well. Services high in demand include professional services, pentesting, managed detection response, and more. It is, therefore, crucial to understand the innovation currently taking place in the cybersecurity sector. These … Read more

From the Winter 2022 Issue

Two Fundamentals That Help You Make Great Decisions for Industrial Cybersecurity

Author(s):

Felipe Sabino Costa, LATAM Industrial Cybersecurity (IACS) Expert, Moxa

Effective cybersecurity management is imperative for all organizations. There are many standards and guidelines available for organizations to refer to in order to move forward. In this article, we will introduce specific action items based on well-defined frameworks and standards when building a Cybersecurity Management System (CSMS) for your own Industrial Control System (ICS). Taking a Defense-in-Depth (DiD) approach to network construction and choosing secure-by-design solutions from trusted vendors can help simplify the ICS cybersecurity decision-making process.