Change 2 to the National Industrial Security Program Operating Manual will require companies working with classified government information to create a full insider threat program. Despite that burden, it should be embraced in these troubling times.
It’s a sad fact that relationships between police and the communities they serve are, in some parts of the country, at an all-time low. The Miami-Dade County Police Department is attempting to change that by using some interesting new technology to reach…
A lot of attention has been given lately to the security in the Internet of Things. Unfortunately, there is already a widely installed base of vulnerable hardware and software that is being exploited for attacks. Are we doomed to another losing game…
On October 15, 2016, the naval commissioning ceremony for the USS Zumwalt will take place in the Port of Baltimore. The USS Zumwalt is not only the newest ship in the U.S. Navy, it represents a new class of warship that takes…
People looking for a historical thriller in the new Oliver Stone movie Snowden may be disappointed. Chris Inglis, who was the Deputy Director of the NSA during the incident, calls the film grossly inaccurate in an exclusive interview with TWB author John…
Standards are being published for creating new private sector Information Sharing and Analysis Organizations. Will these ISAOs be the tools we need to improve the nation’s cybersecurity?
Few technologies are more vital to the bottom line of a modern business than document automation. Document automation’s universal application, speed of accessibility and ease of use can make or break a company of any size. It can mean the difference in…
On February 9, President Barack Obama announced the Cybersecurity National Action Plan (CNAP), which he described as the capstone of more than seven years of determined effort by his administration. The plan builds upon lessons learned from cybersecurity trends, threats, and intrusions.
The…
Despite years of rising concern over cybersecurity risk, the old conflict between operations and security remains the number one challenge for federal agency CISOs. Agencies must do a better job of building risk management into operational decisions.
You may have a missing component in your defenses if you are not protecting your proprietary data. Either by malicious effort or accidental incompetence, users can send customer, financial, secret or sensitive information out of your network via almost unlimited channels. Network World…