Drones are being hailed for possible use in disaster relief. But imagine how they could also be used to frustrate existing, ground-based security systems and devices. In Homeland Security has a post on “Drones: The Future of Disaster Relief?” Sponsored by such prominent firms as Boeing Co., Lockheed Martin Corp., United Parcel Service Inc., IBM […]
Archives: April, 2015
Here’s a discussion from Information Week on the security status of various smartphones for use in business environments. We’re not making any recommendations, just passing a fairly informative-looking post along. Final assurances on security in all its aspects take researching in the context of a buyer’s needs.
Fortunately, there was no untoward result from this carelessness in procedure, but the story of former President George H.W. Bush’s broken broken burglar alarm highlights the point that it’s not just equipment, but adherence to procedures that sustain it, that makes for real security.
Water, power and financial systems are among the backbone facilities considered vulnerable to cyber attack these days. And Transition to Practice (TTP) is a mainstay of the Department of Homeland Security’s efforts “to keep pace with malicious actors who may seek to damage our critical infrastructure sectors”. DHS announces that, in June, its Science and […]
Security industry officials are aiming to standardize school security procedures, based on guidelines released at the ISC West conference in Las Vegas last week. Promoting school security best practices is the Partner Alliance for Safe Schools, or PASS. Government Security News reports that PASS is setting up “a tiered rating system to determine the security […]
Here’s a report on the 10th anniversary of a perhaps little known, but nonetheless vital, agency of the federal government – the Department of Homeland Security’s Domestic Nuclear Detection Office (DNDO). It was established in a 2005 presidential directive to prevent nuclear terrorism through nuclear detection. Truly, it’s good to know that these DHS staffers […]
Bruce Schneier explains why he thinks the metal detectors that have been installed at major league baseball parks this season are “pure security theater – they look good without doing anything to make us safer.” “As a security measure,” Schneier writes, “the new devices are laughable. The ballpark metal detectors are much more lax than […]
The U.S. Federal Bureau of Investigation (FBI) has issued a public service announcement about how “a large number of websites (are) being exploited and compromised through WordPress plugin vulnerabilities.” “Continuous Web site defacements,” the announcement says, “are being perpetrated by individuals sympathetic to the Islamic State in the Levant (ISIL) a.k.a. Islamic State of Iraq […]
It’s not only individuals, but employers, who need to be up on the nature of computer “phishing” attacks. Rohan Ramesh on IBM’s Security Intelligence blog advises that “Spear Phishing Attacks are growing in number and are getting more sophisticated in nature, targeting individuals and employees in various organizations to gain entry into the corporate network. […]
Bruce Schneier refers us to the Southern Poverty Law Center’s timely article about, as Schneier puts it, “the rise of lone-wolf terrorism.” “The long-term trend away from violence planned and committed by groups and toward lone wolf terrorism,” he observers, “is a worrying one.” “Authorities,” Schneier adds, “have had far more success penetrating plots concocted […]