U.S. Homeland Security Director Jeh Johnson announced this week that his department has increased security at federal building across the country in light of recent terror threats and attacks in Canada and elsewhere. Secretary Johnson said the move was a “precautionary” step in light of the recent violence in Canada and Islamic State threats.
Archives: October, 2014
Dr. Huban A. Gowandia, the U.S. Homeland Security Department’s director of the Domestic Nuclear Detection Office, discusses her group’s efforts to deter nuclear terrorism. We’re certainly glad they’re at it, because that has to do with the unthinkable in security terms. Dr. Gowandia discusses her remarks, presented at the University of Tennessee, on Homeland Security’s […]
U.S. Homeland Security Secretary Jeh Johnson is taking the threat of attacks by lone terrorists seriously. Following the Oct. 22 terrorist shooting at Canada’s House of Parliament, In Homeland Security reports that Secretary Johnson is “ordering the Federal Protective service to increase security near federal buildings Washington, D.C. and other larger cities nationwide. ” “As we […]
Let’s go to the level of personal security for a moment. Everything stems from remaining healthy, and there, Ebola isn’t, or shouldn’t be, the biggest U.S. health concern. Whether you’ve gotten your flu shot yet is a more pertinent question. Rutgers Today notes that “the Flu takes anywhere from 3,000 to 48,000 lives a year in this […]
Larry Zeltzer on ZDNet provides a post, “Effective security techniques we don’t follow enough.” Discussed are six security technologies/techniques for IT people to review and/or apply, starting with “Parameterized SQL Queries”. Check them out for inclusion in your book.
Expect security functions to arise from the Internet of Things (IoT) applications of web technology. But for now, it’s enough to learn what the term connotes. Shane O’Neill on InformationWeek provides that service. You’ll discover that it involves more than having a refrigerator transmit recipes for the use of its contents. Patrick Hubbard takes the IoT discussion a bit […]
Here’s some chagrin reading, that is uncomfortable information that’s likely to be at least partly applicable to many of us. Violet Blue on ZD Net’s Zero Day writes about “The six most common ways non-tech people fall victim” to computer hackers. “Oftentimes,” she notes, “these fateful entry points are created by people who have no […]
Oh dear, it’s time for a little light relief, or perhaps profound dismay. Whichever, we invite you to read this recollection by Brian Schmidt, winner of the 2011 Nobel Physics Prize, who took his half-pound gold medal to Fargo, North Dakota, to show to his grandmother. Imagine what happened as his bag went through an […]
Now it’s Kmart too. Another retailer joins Target, Home Depot, Neiman Marcus, Supervalu, Michaels, P.F. Chang’s and Dairy Queen in having their digital credit card systems compromised. “With data breaches costing not only billions of dollars, but claiming executives’ jobs as well,” notes Naked Security, “now is as good a time as any for firms within […]
The evolution, sadly, of cyber security threats is discussed in the start of a series of four articles on SecurityMagazine.com. “The greatest shift in cybersecurity,” it says, “relates to the focus and the responsibility – moving from strictly an ‘IT issue’ to one of a business function. Look no further than the Target breach and the subsequent […]