The U.S. is turning to mini-drones – named Cicadas, for Close-In Covert Autonomous Disposable Aircraft – to target terrorists abroad, advises In Homeland Security. They look like birds flying high. How long will it be, we wonder, before Cicadas have civilian market counterparts that will prompt new concerns over security breaches?
Archives: April, 2016
Figure out how to apply virtual reality techniques to your security challenges. The U.S. Navy has. The Office of Naval Research is advising that personnel at Pearl Harbor (certainly an appropriate location) are using virtual reality gear in simulated combat. “’This is the future of training for the Navy,’ Dr. Terry Allard, head of the […]
Protect an airport well and you can protect just about anything. That’s the feeling you get from reading A SecurityInfoWatch post on airport security. The Transportation Security Administration definitely has a challenging job seeking to insure the safety of the nation’s airports. Yet securing any location has its own problems and issues. The need is […]
Protecting computer-based data and the security systems – physical as well as electronic – that it supports “is a lot like having kids,” says Hans Holmer of the Security Industry Association (SIA). Really? Yes, indeed. “You child-proofed your home before your child was born, and you probably still worry for your kid(s) even now when […]
InfoWorld Advises – Get ready for the security challenges of the future. They’re going to become increasingly digital, frequent and hard to anticipate. It could be an anxious time.
Katie Moussouris on Threat Post Op-Ed discusses developing vulnerability standards on the Internet. They’ve been advanced by “working cooperatively with the hacker community.” Presumably, that’s the friendly hacker community.
Bruce Schneier comes up with a post that leaves you wondering whom you can trust – not the former security director of the U.S. Multi-State Lottery Association, for example. That gentleman, Eddie Tipton, Schneier advises, “installed software code that allowed him to predict winning numbers on specific days of the year, investigators allege. The random-number […]
People have insatiable curiosity, sometimes unfortunately. As when they pick up a USB drive that someone else may have discarded or lost and plug it into their computers – just to see what’s there. Almost half of the USB drives that were discarded in a test at the University of Illinois, reports Naked Security, were […]
Turning to employees and encouraging their input on security concerns can help strengthen a site’s safety. Keen observations on employee input come in this Security magazine post from a hospital setting. But they apply to employee awareness generally. Tim Portale, Chief Safety and Security Office of HCA (Hospital Corporation of America) observes that HCA ” […]