Quantcast
Channel: Engineering and Vulnerability Management Archives - United States Cybersecurity Magazine
Browsing all 12 articles
Browse latest View live

The Role of Voice Authentication in Cybersecurity

Everyone loves to talk about the future of cybersecurity. However, most do not realize that in doing so, they’re using one of the most secure tools available to facilitate that conversation, the human...

View Article


An Information Security Triality: Balancing Security, Surveillance, and...

Information security cultural iconography focuses on heroic and demonic archetypes, resulting in a pageant of evocative, emotional imagery that influences reportage, regulation, acquisition, enterprise...

View Article


Avoiding Phantom Risk – Chasing Exploitability, Not Vulnerability

The gravest warning a pen test report could contain are the words “The host may be vulnerable to remote code execution”.  It is hard to know what that immediately means. Did they get system access on a...

View Article

THE LAST WORD IN ENCRYPTION 101

One of the oldest ciphers is known as the Caesar cipher. The way it works is to assign a number to every letter in the alphabet. In other words, this method assigns the numbers 1 through 26 to the...

View Article

Zero-Knowledge Proofs, D-Day, and the Promise of Trustable Software

An old proverb tells us, “You know nothing until another knows you know it.” Sometimes, though, you don’t want that someone to know sensitive details - just the “fact of.” For example, take April 1942....

View Article


DevOps Automated Governance

In the Spring of 2019, several organizations worked together to create a forum paper called DevOps Automated Governance.[1] The paper intended to create a reference architecture around Governance,...

View Article

Image may be NSFW.
Clik here to view.

Radio Frequency Operations and Training From a Virtually Different Point of View

Radio Frequency (RF) security, sometimes called wireless security, is much more than just WiFi. Over the past few years, there has been rapid growth in WiFi training courses, but very few that...

View Article

Human Security Engineering: A New Model for Addressing the “User Problem”

Despite best efforts, the cybersecurity professional has yet to be able to adequately handle what people refer to as “The User Problem”. A user will inevitably click on a phishing link. A user will...

View Article


Safety Or Simplicity? The Costs Of Convenience In Our Connected Life

Modern technology advancements are placing consumers into uncharted territory, granting limitless access to the internet and its benefits in varied and unique ways. From Smart Homes that automate key...

View Article


Addressing Malicious Websites Through Human Security Engineering

In the Spring 2021 issue of the United States Cybersecurity Magazine, “Human Security Engineering: A New Model for Addressing the “User Problem” I highlighted the strategy of Human Security Engineering...

View Article

QKD versus PQC: A Quantum Showdown? Part 1

The need for communications confidentiality has existed since humans developed language. Accounts of the Greco-Persian wars in fifth century B.C. described steganography, (hiding the existence of a...

View Article

QKD versus PQC: A Quantum Showdown? Part 2

This is part two of a two-part article on secure key distribution in a post-quantum world.  Part one focused on Quantum Key Distribution (QKD) as a method to securely distribute encryption keys.  This...

View Article
Browsing all 12 articles
Browse latest View live