menu

Topic:

Homeland Security Industry

Do We Have Your Attention Now? – Google’s Roar to Exit China

It’s been no secret that our various cyber networks have been susceptible to attack, and public reports on this have basically been greeted by the conventional up and down head-bob followed by the expedited and innocuous statement, “Yes, this is serious.” While there is nothing wrong with those reactions and the attention is surely warranted, something has dramatically changed, and it’s screaming on headlines across the country – Google is threatening to leave China.

Dropping the Ball: Federalizing a National Moment

As the country’s various homeland and intelligence agencies begin to implement the post-Delta Flight 253 changes ordered by the President, it is becoming painfully obvious that we are falling into the same post-9/11 reaction – we are federalizing a national moment. If we are to be a resilient and resourceful nation, the private sector must play a key role in the strategic response and corrective actions following an event such as that on Flight 253.

Moore's Law and Whole Body Imaging: Moving Technology to the Next Level

The news cycles, talking heads and many elected officials seem to be in a bit of a tizzy over the images created Whole Body Imaging (WBI) systems. Solutions to enhance security through the use of WBI will become more effective when the data is synthesized to produce a depiction of the entire situation on a generic form, enabling real-time interpretation without the distraction of raw data. If we take a moment to consider the efficacy of WBI and the invested public and private funds, we are likely to witness a clear example of Moore’s law.

The 300 Spartans of Cyber Security

Recently, an official of the National Security Agency stated that the shortage of highly talented information security professionals had not yet hurt our security, but that it sure made the job more of a challenge. The operative word here is “yet.” Thank God for those professionals manning the terminals across all of our diverse infrastructure sectors. They are holding off the growing tide of cyber threats, and they need help.

Cloud Computing Faces a New Security Challenge

Many commentators (including me) have called Cloud Computing the way of the future. Indeed, I still believe that is true; however, a new wrinkle has come up with regard to the cloud’s security. It seems hackers are using the computing power of the cloud to do bad things. Instead of laboriously working through passwords trying to crack them, hackers have used cloud providers’ linked virtual networks to apply enormous computing power to break codes and perform attacks.

Security Debrief Experts in CQ Homeland Security (Part II)

In this second installment of Congressional Quarterly’s survey of homeland security experts, a number of contributors to Security Debrief consider the Obama administration’s largest error in 2009. Some of the responses are provided below.

Six Predictions for the 2010 Cyber World

Once again, I join with my blogging colleagues in offering some predictions for the coming year. I have kept it to six, so as not to get carried away, and I kept them general, so I have a better chance of being right. Some are nearly no-brainers, but several are definitely going out on a limb. I will let the readers judge if I am “sawing” on the correct side or not.

Security Debrief Experts in CQ Homeland Security

Congressional Quarterly surveyed homeland security experts, a number of whom are contributors to Security Debrief, on the state and future of homeland security. Some of their views on the Obama administration’s best move in homeland security in 2009 are provided here.

Who’s Walking Your Hallways – Protecting Private Sector Infrastructure

Recent comments by Homeland Security Secretary Janet Napolitano highlight the growing threat of homegrown radicalization. What then, can corporate America do to protect itself, the country at large and prevent attacks from taking place? Companies must be aware of who they are letting into their offices, plants and warehouses. Access to private sector infrastructure and technology can have devastating effects in the hands of al Qaeda operatives or sympathizers.

Internet Security Alliance Steps Out

The Internet Security Alliance (ISA), a broadly focused industry group, has released a report as their entry into a race to be the most helpful in cyber security to the Obama Administration. At the National Press Club, the release was marked by a lunchtime gathering and short presentation led by the organization’s president. Recommendations focused on how the government will work with the private sector.