Barriers or other devices in a roadway can halt a car or truck, ut the peril from intruders may not be over even so. Here’s an instance from a military post in Georgia where that happened after “tiger teeth” in the road disabled two vehicles, but shots were apparently fired anyway. Be continually alert!
Archives: June, 2015
Government Security News has posted the winners and finalists in its 2012 Airport, Seaport and Border Security Awards. It’s an interesting rundown, but details won’t be available except in the “2015 Digital Yearbook of Airport, Seaport, Border Security Awards Winners that GSN will produce in the next 30 days.”
Security data breaches are being detected more quickly, but, notes Security Magazine, “The better all industries get at discovering data breaches, the faster they place themselves in the cross-hairs of the media. It is a definite Catch-22 for any organization to admit they’ve been breached, knowing they’ll become a victim of the media meat grinder.” […]
Being effectively prepared for an incident of terrorism is largely a matter of focus: recognizing that such a moment could occur and being prepared, as far as possible, to ward it off. Unfortunately, the American Thinker blog has a good negative example of this: “A classic Friday-afternoon document dump…incriminating the Bill Clinton administration in crippling […]
Bruce Schneier makes a great point: “One of the biggest conceptual problems we have is that something is believed secure until demonstrated otherwise. We need to reverse that: everything should be believed insecure until demonstrated otherwise.” Schneier is commenting in the context of whether or not drug pumps at hospitals can be hacked. In these […]
Oh dear, say it isn’t so. But it is. The FBI and Justice Department are investigating the St. Louis Cardinals for allegedly hacking into the computer network of the Houston Astros “to steal closely guarded information about player personnel.” That’s the word from Homeland Security Watch, which quotes a New York Times story. “Investigators,” says […]
Federal employees are understandably upset that their personnel data is likely in the hands of hackers in a massive security breach at the U.S. Office of Personnel Management (OPM). “The OPM itself,” says Information Week’s Dark Reading blog, “has not disclosed what systems were affected and said it believes the intrusion occurred in December 2014. […]
Something to ponder about our growing digital dependence. Here’s a Security magazine post advising that, while the situation is improving, it still takes weeks to months before businesses identify security threats that have penetrated their digital networks. Become familiar with Pricewaterhouse Coopers 2015 Global State of Information Security Survey. The world keeps moving along.
What’s involved in a cybersecurity assessment? Here, from Information Week’s Dark Reading blog, is one view of what it takes to insure that your information systems are secure from attack. It’s a tall order, but well worth paying attention to, or calling in a computer security specialist to assist.
Like many organizations, The U.S. Department of Homeland Security (DHS) apparently has an uneven leadership profile. Christian Beckner on Homeland Security Watch reviews a recently issued DHS report on the morale of its employees. Its first recommendation is “Greatly increase the emphasis on leadership qualities when filling managerial positions and when assessing the performance of […]