Sign up for Updates!

CYBERSECURITY ARCHIVES

Cyber Grand Strategies: Technology vs. Human Interaction

One lesson learned from the National Security Agency leaks in 2013 is that disrupting terrorist activities in cyberspace requires more than just the latest technology. Human interaction plays a critical role in thwarting criminal activity while protecting personal information and privacy. Canada offers one example of leveraging human networks and

The Real NCIS: An Interview With Thomas Betro

The Naval Criminal Investigative Service’s (NCIS) former Director Thomas Betro provides insights on how to keep the U.S. homeland safe from both physical threats and cyberthreats. He shares information specific to NCIS’s responsibilities, technologies, and efforts to protect against cyber, piracy, and insider threats.

The Operational Imperative of Cybersecurity & Resilience

As technology advances, so do the interconnected relationships among various technologies, communities, and infrastructures. This interconnectedness creates greater efficiency, but also raises many concerns. The consequences of not making cybersecurity an integral part of risk management and strategic decision-making plans can be devastating.

Public Health Response & Emergency Management Planning

Most disaster responses necessarily include a public health component. Emergency managers must always be aware of that fact when dealing with emerging threats and their possible consequences. By incorporating a public health response into emergency management planning, the nation will be much better prepared for the next pandemic or biological

Hackers & Federal Agencies: Broken Connections

Recent leaks about government surveillance programs that track U.S. and U.K. phone calls and internet communications have raised major concerns over the privacy of personal communications. There may be even greater difficulties, though, if current ties between the federal government and the U.S. “hacker” community are weakened or, perhaps, severed

Holistic Security – Various Ways to Reduce Vulnerability

Even multiple isolated incidents may not be enough to raise a red flag that intellectual property theft is being planned. By ensuring that each incident is reported through the proper channels and analyzed along with other reported incidents, agencies and corporations may be able to thwart potential cyber crimes before

When Cyber Space Meets the Real World

Emergency managers should not neglect their basic emergency management principles when faced with a cyber incident. Although information technology (IT) professionals have the technical expertise, emergency managers maintain responsibility for coordinating the response to cyber incidents. Therefore, by working together, emergency managers and IT professionals can provide a more effective

A Roadmap for Improving Cyber Preparedness

The U.S. information security and technology communities are no longer solely responsible for protecting critical infrastructure from cyber threats – emergency managers also play an increasingly important role in that task. Increasing the overall level of cyber preparedness therefore requires closer coordination, information sharing, and effective planning, as well as

An Interview With the Honorable Paul McHale

The former Assistant Secretary of Defense for Homeland Defense and Americas’ Security Affairs provides his own nonpartisan insights on the current state of U.S. homeland defense, comments on progress made as well as gaps that still need to be filled, and recommendations for better protecting the U.S. homeland in the

Amateur Radio and the Healthcare Field

Amateur Radio can be a lifesaving communications service that has supported emergency responders, law-enforcement teams, and the public during major flood events, power outages, hurricanes, earthquakes, and other disasters both large and small. Like other “Guardian Angels,” the nation’s Amateur Radio operators may not always be seen, but they are

Forensic Incident Responses & Security Preparedness

Eight “Centers of Excellence” established; a massive international “Challenge” competition; and a stunning, rapidly expanding, interest in the once arcane science and profession of digital forensics and various related fields. Those are but a few of the notable DC3 accomplishments achieved to date, but additional domains and designations are just

IT Preparedness: At Long Last, a Major DHS Priority

In today’s complex world, information technology (IT) systems serve as both the intellectual libraries and operational brains of virtually all components of the vital infrastructures of businesses, utilities, and the organizations and agencies of all levels of government. For this reason, among others, the maintenance, protection, and preservation of IT

TWITTER

Follow Us

Get Instant Access

Subscribe today to Domestic Preparedness and get real-world insights for safer communities.

Translate »