Best Practices - page 2

// by Homeland Security Today

Forecasting Risk: How to Maximize Assessment Efforts Using Minimal Resources

Many organizations commit significant resources to forecast a market’s growth potential. Before investing in a company, it is likely we would review a summary prospectus of their potential earnings. We also look to the National Weather Service for a forecast to determine our resource needs for a weather-dependent activity, days or possibly weeks, in advance.… Keep Reading

// by Homeland Security Today

Cybersecurity and Critical Infrastructure Protection in 2016

The annual National Cybersecurity Awareness Month in October presents the cybersecurity stakeholder community with a fresh opportunity to address basic gaps in cybersecurity protection and preparedness. The goal is to improve overall security and resilience while making the nation safer and more secure. Much of the media and public attention in recent years has been… Keep Reading

// by Homeland Security Today

Fifteenth Anniversary of 9/11 – Where Are We?

With the 15th anniversary of September 11, 2001 soon to arrive, the United States is now engaged in the longest war in its history. Coined by President Bush on the day of 9/11, the term “War on Terror” describes a general conflict against all global Islamist terror groups, especially Al Qaeda, the Taliban and associated… Keep Reading

// by Homeland Security Today

Why DoD Test Ranges Don’t Have to Cause ‘Predictable Permanent Thunderstorms’

We’ve all been there: The pilot has informed the cabin that today’s flight will be re-routed around a bank of thunderstorms, ultimately resulting in a late arrival, missed connections and the general malaise which often can define air travel today. Similar to a bank of thunderstorms, the US Department of Defense (DoD) maintains dozens of… Keep Reading

// by Homeland Security Today

End-to-end Encryption: Nuisance or Safety Net?

Electronically maintained personal and financial data has been the subject of public and government attention for many years now., Feature articles by major publications, such as the New York Times and the Washington Post, have raised serious concerns about lost, stolen or misused personal and financial information. These losses have been so extensive that they… Keep Reading

// by Homeland Security Today

Business Email Compromise: Hackers and Competitors Infiltrate via Social Engineering

Everyone in information security should know that business email compromise (BEC) attacks are on the rise. However, many security professionals may not realize how pervasive these threats have become; the rate of increase in BEC is remarkable. The FBI released an alert on April 4 that included some sobering statistics about fraudulent wire transfer requests:… Keep Reading

// by Homeland Security Today

Security from Above: How Earth Observation Helps to Keep America Safe

Less than two weeks after the September 11, 2001 attacks in New York, Virginia and Pennsylvania, the first Director of the Office of Homeland Security was appointed and a new phrase entered the English lexicon. Taken from a 1990s Pentagon report, the phrase ‘homeland security’ was designed to reassure the people of the United States… Keep Reading

// by Homeland Security Today

Eating Your Own Cyber Dog Food: An Inward Look at Cybersecurity

During recent conversations with several executives from cybersecurity business consultants that support the US Government, I asked who they’d hold accountable for a breach of their own business’ network. I was not overly surprised bythe number one answer, “I don’t know,” followed by, “not me,” and finally (at least one had a plan) the “Chief… Keep Reading

// by Homeland Security Today

Why Software Patching is Essential in Today’s World

A few years back, business came to a grinding halt for a European supermarket chain when it was infected with the Conficker virus. The virus caused the system to slowly use up all the system resources at more than 500 stores and 20,000 devices until they all stopped working, leaving all the company’s stores virtually… Keep Reading

SIGN UP NOW for FREE News & Analysis on topics of your choice across homeland security!


Go to Top