The infamous Tommy-gun toting John Dillinger was once asked why he robbed banks. He responded, “Because that’s where the money is.” That simple logic is similar to the thinking of government leaders, like DHS Secretary Jeh Johnson, who are looking to California as a vault holding a priceless commodity—a high-tech workforce.
On the eve of the second anniversary of the Boston Marathon bombing, Juliette Kayyem and WGBH radio have launched a new Podcast, “Security Mom,” offering a fresh take on the nation’s homeland security conversation.
For the past few months, a Blue Ribbon Panel on Biodefense has been receiving input from industry and policy experts on the challenges America faces from the bio-related threats. The public testimony portion of their assignment recently concluded, and now the Panel will begin its review and recommendation work.
In Security Debrief’s sixth annual April Fools coverage, we’ve collected stories the rest of the media somehow missed…
The Boston Marathon bombing was the first terror attack on a sporting event since the 1996 Olympic Games. It was a terrible reminder that violent extremists are constantly seeking targets that capture public attention but are difficult to secure. Enter DHS’ Best Practices in Anti-Terrorism Security (BPATS) guide.
By David Z. Bodenheimer
The U.S. federal government’s acquisition rules and buying practices have a direct impact upon major segments of the U.S. and global marketplaces. Cybersecurity Executive Order 13636 and Presidential Policy Directive 21 both recognize that the federal acquisition process must be addressed as part of the overall federal strategy for enhancing cybersecurity. It is time to harmonize the cyber acquisition regulations.
While ISIS is capturing national concern, Iraq is not the only place where terrorist activities are happening this month. Earlier in June, Tarheek-e Taliban attacked the Karachi, Pakistan airport. What is striking is the terrorists were found with a gunshot wound U.S. military technology called XStat, which had only just been approved by the FDA. How did terrorists get this new technology?
Increasing adoption of cyber insurance products and frequent cyber-related initiatives across the insurance and risk world has been incredibly positive. Yet, many companies that are not consumer-facing are struggling with the insurability of their increased exposure. The insurance industry needs to embrace this evolving reality.
By Gary Warner
This week, President Obama unveiled a set of guidelines issued by the National Institutes of Standards and Technology and a new public-private partnership program. While I join with others in applauding Mr. Obama’s creativity in making progress in protecting our nation’s cyber infrastructure, it is important to note what is and what is not being addressed by these guidelines. Where, for example, does the Target Breach fall?
Last Thursday, a chemical storage tank leaked about 7,500 gallons of 4-methylcyclohexane methanol into the Elk River, just one mile upstream from the West Virginia American Water plant. Thankfully, the water plant owner was forward thinking enough to invest in preparedness before an immediate need arose. This undoubtedly helped the plant respond to the chemical leak. Something tells me there’s a lesson there.