The magazine of the MCPA                         

Click here to be published and contribute to the professional dialogue!

Original Content

  • Proliferation in Cybersecurity By Trey Herr The WannaCry ransomware, and more recent notPetya wiper, are the latest but certainly not the only examples of proliferation when it comes to malicious software. What is ...
    Posted Jul 23, 2017, 5:09 PM by James Caroland
  • Cyber Making Waves: The Need for Maritime Cyber Security Frameworks By Ian W. Gray    90% of the world’s goods are shipped via the oceans on over 51,000 merchant ships belonging to multiple different countries.  For the last several ...
    Posted Jul 23, 2017, 4:46 PM by James Caroland
  • Knockout by Cyber Strike – Fighting Like It’s 1989 By John DobrydneyThe “Pearl Harbor” metaphor for a successful cyber strike against the United States is an apt one and provides a vehicle for the discussion of initial post ...
    Posted Jul 3, 2017, 6:07 PM by James Caroland
  • Developing a Strategy for Cyber Conflict By Arnold J. Abraham, Institute for Defense Analyses Introduction History teaches the importance of developing the right strategy to adapt to a changing situation on the world stage. At the ...
    Posted Jul 3, 2017, 6:06 PM by James Caroland
  • The Cyber Security Ratio By Daniel Cahill   Introduction   Governments and private firms spend significant amounts of their budgets on cyber security to ensure confidentiality, integrity, availability of data, and to limit liability. How much ...
    Posted Apr 20, 2017, 5:15 PM by Michael Lenart
Showing posts 1 - 5 of 43. View more »

Ongoing published articles above. Consolidated magazine below.

Michael Lenart,
Oct 18, 2016, 3:28 PM
Joe Billingsley,
Jan 2, 2016, 8:11 PM