The fifth DHS Secretary will have their hands full with a job that has more critics than friends. Here are the top skills the next Homeland Security Secretary will need.
Nothing can change the dynamics of a presidential race faster than a debate performance. With the first debate approaching, what will the nominees have to say about national security?
By Mike Martin
Since the cyber attack on the Democratic National Committee and the Democratic Congressional Campaign Committee, there has been talk about counting U.S. elections as critical infrastructure, but that might do more harm than good.
The George Washington University annual program, “Securing Our Future,” bought together national, homeland and cyber security experts to discuss U.S. security challenges and priorities. What emerged were three clear metrics for measuring success in the fight against ISIS and al Qaeda.
By Casey Lucius
The recently introduced Feinstein-Burr bill would force encryption providers to maintain backdoors in case the government shows up with a court order. It is bad for government, business and the public.
By Max Skalatsky
Every week, we hear how the FBI is attempting to subpoena text messages from Apple. Instead of tech companies trying to out-argue the Federal government, is it possible to engage with policy makers and law enforcement to understand what the next generation technologies will be?
Apple is fighting a federal magistrate’s order in connection with the investigation of the San Bernardino shootings. This is another instance of consumer privacy potentially conflicting with homeland security issues. Or is it?
On Tuesday, several media outlets reported that Intelligence Community Inspector General sent a letter to Congress regarding Sec. Hillary Clinton stored documents on her home server that were classified “Special Access Program.”
By Dan Gerstein
Cybersecurity is a two-sided proposition, requiring both defense of internal networks and the ability to operate effectively in the cyber domain. Securing government networks is certainly necessary, but authorities should not lose sight of the need to couple their defense of America’s networks with appropriate resources dedicated to combating criminal, terrorist and other threats in cyberspace.