bnv.fnr.search/tags;tile=1;pos=top;sz=728x90;ord=
7:44 pm, May 22, 2015

Search Result

Search Tags:  homeland security

QHSR review complete

How bloggers had a hand in writing the Quadrennial Homeland Security Review.

Tags: mngt , Homeland Security , DHS , Max Cacas

Monday - 02/08/2010, 05:08pm EST
Listen

Cyber Security - Five Key Challenges

In addressing the importance of cyber security as a government priority in testimony before a Senate Homeland Security and Governmental Affairs subcommittee last fall, Vivek Kundra, the Federal Chief Information Officer, said:

"Our Nation's security and economic prosperity depend on the stability and integrity of our Federal communications and information infrastructure." Federal News Radio has reportedthat the federal government will spend $8.3 billion on computer security this year - marking a 60% increase in four years. As Federal information security decision-makers allocate dollars and resources to protect our infrastructure, it is important to prioritize the key challenges they face. These include:

    1. Increased use of mobile devices.Mobile devices are becoming smaller and faster every day. Agencies face even more challenges as mobile applications have now become widely used and they are even looking to build their own mobile applications to increase their productivity in the field.
    2. Continued movement of data into the cloud. Cloud computing has become a pervasive buzzword but in the end, risk stems from a matter of oversight and control. Agencies must rely on strong governance and compliance oversight of their service providers since they do not own or control the systems where their data resides.
    3. Changing regulatory environment. NIST has undergone sweeping changes across their Special Publications by introducing a new Risk Management Framework and introducing new nomenclature such as "Security Authorization." OMB continues to press their performance metrics as a part of the FISMA reporting process and could see some changes in the next 9 months.
    4. Application security. Attackers have now moved their focus from the network and infrastructure level to the application layer. We're seeing more attacks proliferated through applications such as Adobe and web browsers but some high profile data breaches stemmed from custom web applications through SQL injection attacks.
    5. Developing/maturing offensive capabilities. "Understanding the offensive to build the defensive" has become the mantra for today's cyber security efforts. The ability to understand the mindset of an attacker and their methods becomes critical in building defenses that focus on these attack vectors. Reigning in the changes can pose a difficult problem for several agencies but it ultimately comes down to understanding the threats to your particular agency and narrowing your defenses on those areas. Focus and prioritization become key in the constant battle.

Tags: Technology , Trusted Advisor Blog , cyber security , Homeland Security , cloud , NIST , FISMA , OMB

Tuesday - 02/02/2010, 10:46am EST

In Depth Conversation: Howard Schmidt's to-do list - cyber priorities for 2010

Howard Schmidt is moving into his new job "at Mach Four with his hair on fire," according to one of today's panelists.

Tags: In Depth Conversation , Technology , management , cybersecurity , Homeland Security , DHS , Greg Garcia , Hugo Teufel , Dan Chenok

Monday - 01/25/2010, 08:37pm EST
Listen

FBI Director Robert Mueller comes under fire on terrorist arrest

Christmas Day underwear bomber should have been handed over to military, says one Senator.

Tags: management , Defense , DoD , Homeland Security , DHS , State Department , Senate Judiciary Committee , Jeff Sessions , Robert Mueller , FBI , Federal Bureau of Investigation

Thursday - 01/21/2010, 12:14pm EST

Security risks abound in Haiti

National Security Correspondent J.J. Green reports.

Tags: newscast , Haiti , national security , Homeland Security , J.J. Green

Tuesday - 01/19/2010, 06:45pm EST
Listen

Attempted bombing now confirmed as al Qaeda attack

Homeland Security Today editor David Silverberg has analysis.

Tags: management , Homeland Security , Al Qaeda , Homeland Security Today , David Silverberg , Scott Carr

Monday - 01/04/2010, 04:27pm EST
Listen

The role of scanning technology in terror prevention

Peter Kant is the Vice President of Global Government Affairs for Rapiscan Systems. He joins the Federal Drive to talk about the role of scanning technology in terror prevention.

Tags: Technology , Homeland Security , Peter Kant , Rapiscan , scanning technology , full-body scans

Wednesday - 12/30/2009, 09:12am EST
Listen

What TSA can do to prevent terror incidents on airplanes

J. Bennet Waters of the Chertoff Group on ways the TSA can prevent a repeat of Christmas Day's failed attempt aborad Northwest 253.

Tags: Technology , Homeland Security , J. Bennet Waters , Chertoff Group , Northwest Flight 253 , DHS , TSA

Tuesday - 12/29/2009, 09:21am EST
Listen

What DHS can do to prevent more terror attempts

CSIS's Rick Nelson discusses the ramifications of Northwest 253 for Homeland Security.

Tags: management , Technology , Homeland Security , DHS , Rick Nelson

Tuesday - 12/29/2009, 09:02am EST
Listen
  •  
  • 13
  •