Columns

Best Practices - page 5

// by Homeland Security Today

Rebuilding Communication Infrastructure in the Aftermath of Disaster

Natural disasters affect millions of people around the globe every year, causing untold dollars in damage and disrupting and endangering many lives. In addition, disasters of every size present major challenges to the public safety personnel who are charged with emergency response and relief. While all public safety agencies prepare meticulously for natural disasters, Typhoon… Keep Reading

// by Homeland Security Today

The Potential to Expand Border Security Integration Eco-System

While attending a recent homeland security related industry conference, several organizations, agencies and private-industry entities outlined their ideas and solutions on how best to secure our nation’s borders through new business processes and application of technology. Whether they are physical or virtual, “gates, guards and guns” have long been, and will remain for the foreseeable… Keep Reading

// by Homeland Security Today

Harnessing Big Data to Expose Human Trafficking

It’s hard to fathom that as late as 2012, the US State Department estimated that 27 million people around the world are trapped in a life of slavery. Recent high-profile news stories have served as a painful reminder that even in the US, individuals are held against their will and subjected to forced labor, prostitution… Keep Reading

// by Homeland Security Today

Snowden’s Actions Shouldn’t Deter Whistleblowers From Stopping Fraud In Classified Projects

Employees of government contractors working on classified projects can blow the whistle in certain instances of wrongdoing without violating the law — despite the impression left by the actions of Edward Snowden, a former National Security Agency (NSA) contractor. When a government contractor is defrauding the government and making false claims that it is meeting the terms… Keep Reading

// by Homeland Security Today

Can Data Help Us Fight the ‘Forever War’?

The war on terrorism financing and the crimes that support terrorists is a “’Forever War’ of networks in a digital society that will never end,” said former Philip Mudd, a former Deputy Director of National Security, FBI, and former deputy director of the CIA’s Counterterrorist Center. At the recent SAS Counterterrorism and Financial Crimes Forum… Keep Reading

// by Homeland Security Today

Dangerous Duplicates; Fighting Counterfeits and Protecting the Security of Government Networks

In an increasingly connected world — where governments, industries and communities rely on the integrity of their network infrastructure as much as the security of their physical infrastructure — another serious security risk has surfaced. And that’s the threat to digital data and devices from attacks within their supply chain. Cyberthreats abound, from lone-wolf hackers… Keep Reading

// by Homeland Security Today

It’s Off the Shelf and to the Battlefield as the Military Increases Adoption of Commercial Solutions

Since before World War II, the conventional wisdom has held that the military leads the way in research and development, investing heavily in technologies that would someday find mass-market applications. The Jeep, GPS, computers, and the beginnings of the Internet are all examples of innovations conceived by or for the military that ultimately found their… Keep Reading

Placeholder
// by Homeland Security Today

Framework for Integration of Emergency Support Function Infrastructure Protection and Supply Chain Management Efforts

Disasters and catastrophes over recent years have highlighted the need for improved coordination between the public and private sectors with the understanding that while the public sector plays a key leadership and coordination role during emergencies and disasters, it is really the private sector that maintains the underlying tools and resources needed for long term… Keep Reading

// by Homeland Security Today

Sensing Potential Biological, Chemical Agents and Drug Threats

Living in Israel has enormous benefits, but it also has drawbacks, and anyone who follows the news can readily see the downsides. Not to get into politics, but the more difficult aspects of Israeli life seem to be more interesting for viewership and subscriptions to electronic and print news. The benefits, however, far outweigh anything… Keep Reading

// by Homeland Security Today

Keeping Agency Data Safe in the Age of BYOD

The Bring Your Own Device (BYOD) revolution in IT is sweeping through organizations of all kinds, including government agencies. Like their peers in the private sector, government employees are buying their own smartphones and tablets and bringing them to work. They are using these devices to store and transmit a mind-boggling mix of content. Personal… Keep Reading

1 3 4 5 6 7 13

SIGN UP NOW for FREE News & Analysis on topics of your choice across homeland security!

BEYOND POLITICS.  IT'S ABOUT THE MISSION. 

Go to Top