Quantcast
Channel: Security Debrief » Cybersecurity
Browsing all 126 articles
Browse latest View live

EPA – Proving How “Small” Government Can Be

The EPA was set to disregard the counsel of the Department of Justice, water system owners/operators and security experts by posting the non-Off-site Consequence Analysis (non-OCA) sections of the...

View Article



In Cyber, Those That Deny Threats Never Help

When I was a Deputy Assistant Secretary of Defense, every time we tried to do something – like develop cyber security capabilities – we were accused of cravenly seeking new budget allocations. Yet, the...

View Article

The Homeland Security Show – What You’ve Missed and What’s Coming Up

For the past month, the Homeland Security Show I host is spotlighting issues in homeland security without the interlude of media packaging stories into three minute segments or subjected to political...

View Article

Homeland Security Leaders Question Cyber Reality

Once again, I was honored to do a presentation for the DHS-sponsored Center for Homeland Security and Defense. This long-term, comprehensive course introduces operational leaders from law enforcement,...

View Article

Administration Decides to “Fight” for Cyber Security

On Monday, one of the Obama Administration’s heavies took to the Op-Ed page of the Washington Post to fight for cyber security. John Brennan, the President’s senior advisor on counterterrorism and...

View Article


In the World of Cyber Security, It’s Go Time

Once again, America is officially under attack. According to multiple reports, including an "incident response" report from the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), U.S....

View Article

The War of 1812 Redux – Using National Security Tools to Protect the Private...

By Rob Strayer Two hundred years ago today, the United States declared war against Great Britain, beginning the War of 1812. At that time, the British Navy was the aggressor, boarding U.S. commercial...

View Article

Chinese Cyber Attacks Are Looting U.S. Private Sector

One issue that receives too little public attention is the blatant use of hackers by China to steal U.S. intellectual property, defense technology, and other data critical to national security and...

View Article


Locking Private Sector Shields Against Cyber Attacks

Information travels through America's cyber networks at the speed of light. The legislation that will be used to govern some aspects of network security is traveling at the speed of bureaucracy. The...

View Article


Observations on the 2012 Aspen Security Forum

The Aspen Institute's Security Forum, held at the end of July, proved why it has become, in only three years, a "must-attend" event for those of us working in the homeland and national security space....

View Article

GAO Report Shows Weakness of Regulatory Approach in Cyber

The Smart Grid is the way of the future in electricity management, but it also presents cybersecurity challenges. A recent report on Smart Grid Cyber Security from the Government Accountability Office...

View Article

Maintaining the Status Quo – 2012 National Preparedness Month Presidential...

On the day before the Labor Day weekend, the White House released the President’s latest “National Preparedness Month” Proclamation. Like last year’s, the proclamation employs the term “resilience.”...

View Article

The Time Has Come – Recognizing a Need for Regulation in Cybersecurity

After twenty years of rapid growth, we now stand with an unregulated and uncontrolled Internet vulnerable to attack and disruption from anywhere and by anyone on the planet. We have minced around the...

View Article


America’s Advanced Persistent Asymmetrical Threat

The White House's 2009 Cyber Review estimated the loss of intellectual property from companies as a result of cyber-based hacking in 2008 alone exceeded $1 trillion in value. FBI Director Mueller said...

View Article

The Real Danger of a BYOD Strategy

Many companies are examining the possibility of switching to Bring Your Own Device (BYOD) as a method of significantly reducing their IT infrastructure capital costs. Here is but another example of how...

View Article


Cybersecurity Is Not A Partisan Issue

Senate Majority Leader Harry Reid and his congressional colleagues’ proposed Cyber Security Act of 2012 is the wrong solution for America's cybersecurity problem. The split is not between Democrats and...

View Article

Homeland Security – What Next?

By Doug Doan So far, none of the presidential candidates have mentioned much about Homeland Security. With so many other problems, issues surrounding how best to organize, manage and lead the vast DHS...

View Article


Not Your Father’s Internet – Mounting Digital Challenges in 2012

There are few spots left around the world without Internet access, and few people who cannot reach out to access it. It has been relatively free of state interference and American dominated. However,...

View Article

Cyber Déjà vu All Over Again – Challenges in 2013

Yogi Berra once observed after two of his teammates smacked back to back homers, “it was déjà vu all over again.” His wisdom applies to cyberspace in 2013 – it is going to be déjà vu all over again....

View Article

Piracy on the Cyber High Seas

The New York Times recently admitted it had been raided by Chinese “privateers,” stealing reporter’s notes and sources. With this act by the Chinese, we now face clearly the idea that a nation-state...

View Article
Browsing all 126 articles
Browse latest View live




Latest Images