Best Practices - page 4

// by Homeland Security Today

Moving Beyond Smart Cards for Secure, Reliable Government Authentication

Strong authentication remains a cybersecurity priority under the Office of Management and Budget’s (OMB) cross-agency priority goals that were announced in the 2015 federal budget. In its 2015 budget report to Congress on the Federal Information Security Management Act (FISMA) compliance, OMB indicated nearly one-third of federal security incidents could have been prevented by strong… Keep Reading

// by Homeland Security Today

How One Hospital Prepared to Treat Patients with Ebola

In response to the 2014 Ebola epidemic, the largest in history, MedStar Health began a focused program to improve healthcare provider response to patients with suspected or confirmed Ebola infection. While these actions are being taken in response to the recent Ebola outbreak, these practices and procedures also will help protect our staff when treating… Keep Reading

// by Homeland Security Today

Now is the Time to Plan for an Emergency

If recent headlines have proven anything, it’s that organizations never know what’s in store for them. If it’s not the economy or a natural disaster, it could be outright terrorism, whether physical or digital in nature. As the recent Sony hack revealed, even private companies stand to suffer from politically motivated attacks. Both public entities… Keep Reading

// by Homeland Security Today

Computer Forensics Critical in the Trial of Silk Road’s Ross Ulbricht

The ongoing trial of Silk Road creator Ross Ulbricht (a.k.a. Dread Pirate Roberts, or DPR) is not only fascinating, but it will have tremendous implications for criminals in the future. With close to a million registered users on the Silk Road and approximately $1.3 billion in transactions, the government had no choice but to prosecute… Keep Reading

// by Homeland Security Today

Typhoon Haiyan: How Analytics were Used for Disaster Relief

Typhoon Haiyan ripped through the Philippines in November 2013, killing thousands and leaving hundreds of thousands homeless. Within a day, help was on the ground from the International Organization for Migration (IOM), an intergovernmental first response organization. IOM is responsible for managing displaced populations and experienced in managing shelters and coordinating operations efforts in places… Keep Reading

// by Homeland Security Today

Our Electric Substations Need Protection Beyond Fences

On April 16th, 2013, terrorists attacked a substation near San Jose California. For 10 full minutes, snipers fired openly at PG&E’s Metcalf transmission substation. At this point, a plant operator became aware of the shots and contacted the police. Unhindered by guards or police for far too long, theterrorists managed to incapacitate 17 of the… Keep Reading

// by Homeland Security Today

Integration of Airport Checkpoint Security

Aviation is one of the fastest growing industries in the world, with an average increase in passenger numbers of nearly 5 percent every year. It is anticipated that about 3.5 billion travelers will pass through the world’s airports in 2015 — equivalent to about 10 times the population of the United States. But such healthy… Keep Reading

// by Homeland Security Today

The Boston Marathon Bombings: Lessons to Learn From

The April, 2013 Boston Marathon bombing clearly showed how video surveillance can be instrumental in capturing those responsible for terrorist bombings. It also demonstrated how the “shelter in place” tactic was successfully used to limit injuries and fatalities in the aftermath of the twin explosions. Lessons learned from the incident can be applied to future… Keep Reading

1 2 3 4 5 6 13

SIGN UP NOW for FREE News & Analysis on topics of your choice across homeland security!


Go to Top