CYBERSECURITY ARCHIVES
Cyber Grand Strategies: Technology vs. Human Interaction
Bonnie Butlin
February 19, 2014
One lesson learned from the National Security Agency leaks in 2013 is that disrupting terrorist activities in cyberspace requires more than just the latest technology. Human interaction plays a critical role in thwarting criminal activity while protecting personal information and privacy. Canada offers one example of leveraging human networks and
The Real NCIS: An Interview With Thomas Betro
Aaron Sean Poynton
February 19, 2014
The Naval Criminal Investigative Service’s (NCIS) former Director Thomas Betro provides insights on how to keep the U.S. homeland safe from both physical threats and cyberthreats. He shares information specific to NCIS’s responsibilities, technologies, and efforts to protect against cyber, piracy, and insider threats.
The Operational Imperative of Cybersecurity & Resilience
Tom Ridge
February 12, 2014
As technology advances, so do the interconnected relationships among various technologies, communities, and infrastructures. This interconnectedness creates greater efficiency, but also raises many concerns. The consequences of not making cybersecurity an integral part of risk management and strategic decision-making plans can be devastating.
Public Health Response & Emergency Management Planning
Patrick P. Rose
October 9, 2013
Most disaster responses necessarily include a public health component. Emergency managers must always be aware of that fact when dealing with emerging threats and their possible consequences. By incorporating a public health response into emergency management planning, the nation will be much better prepared for the next pandemic or biological
Hackers & Federal Agencies: Broken Connections
Rodrigo (Roddy) Moscoso
July 31, 2013
Recent leaks about government surveillance programs that track U.S. and U.K. phone calls and internet communications have raised major concerns over the privacy of personal communications. There may be even greater difficulties, though, if current ties between the federal government and the U.S. “hacker” community are weakened or, perhaps, severed
Holistic Security – Various Ways to Reduce Vulnerability
Armond Caglar
July 24, 2013
Even multiple isolated incidents may not be enough to raise a red flag that intellectual property theft is being planned. By ensuring that each incident is reported through the proper channels and analyzed along with other reported incidents, agencies and corporations may be able to thwart potential cyber crimes before
When Cyber Space Meets the Real World
Markus Rauschecker
July 17, 2013
Emergency managers should not neglect their basic emergency management principles when faced with a cyber incident. Although information technology (IT) professionals have the technical expertise, emergency managers maintain responsibility for coordinating the response to cyber incidents. Therefore, by working together, emergency managers and IT professionals can provide a more effective
A Roadmap for Improving Cyber Preparedness
Monica Giovachino and Sarah Tidman
July 10, 2013
The U.S. information security and technology communities are no longer solely responsible for protecting critical infrastructure from cyber threats – emergency managers also play an increasingly important role in that task. Increasing the overall level of cyber preparedness therefore requires closer coordination, information sharing, and effective planning, as well as
An Interview With the Honorable Paul McHale
Aaron Sean Poynton
December 26, 2012
The former Assistant Secretary of Defense for Homeland Defense and Americas’ Security Affairs provides his own nonpartisan insights on the current state of U.S. homeland defense, comments on progress made as well as gaps that still need to be filled, and recommendations for better protecting the U.S. homeland in the
Amateur Radio and the Healthcare Field
Michael Corey
May 16, 2012
Amateur Radio can be a lifesaving communications service that has supported emergency responders, law-enforcement teams, and the public during major flood events, power outages, hurricanes, earthquakes, and other disasters both large and small. Like other “Guardian Angels,” the nation’s Amateur Radio operators may not always be seen, but they are
Forensic Incident Responses & Security Preparedness
Dawn R. Blanche
February 22, 2012
Eight “Centers of Excellence” established; a massive international “Challenge” competition; and a stunning, rapidly expanding, interest in the once arcane science and profession of digital forensics and various related fields. Those are but a few of the notable DC3 accomplishments achieved to date, but additional domains and designations are just
IT Preparedness: At Long Last, a Major DHS Priority
Jordan Nelms
January 11, 2012
In today’s complex world, information technology (IT) systems serve as both the intellectual libraries and operational brains of virtually all components of the vital infrastructures of businesses, utilities, and the organizations and agencies of all levels of government. For this reason, among others, the maintenance, protection, and preservation of IT
Follow Us
Get Instant Access
Subscribe today to Domestic Preparedness and get real-world insights for safer communities.