EPA – Proving How “Small” Government Can Be
The EPA was set to disregard the counsel of the Department of Justice, water system owners/operators and security experts by posting the non-Off-site Consequence Analysis (non-OCA) sections of the...
View ArticleIn Cyber, Those That Deny Threats Never Help
When I was a Deputy Assistant Secretary of Defense, every time we tried to do something – like develop cyber security capabilities – we were accused of cravenly seeking new budget allocations. Yet, the...
View ArticleThe Homeland Security Show – What You’ve Missed and What’s Coming Up
For the past month, the Homeland Security Show I host is spotlighting issues in homeland security without the interlude of media packaging stories into three minute segments or subjected to political...
View ArticleHomeland Security Leaders Question Cyber Reality
Once again, I was honored to do a presentation for the DHS-sponsored Center for Homeland Security and Defense. This long-term, comprehensive course introduces operational leaders from law enforcement,...
View ArticleAdministration Decides to “Fight” for Cyber Security
On Monday, one of the Obama Administration’s heavies took to the Op-Ed page of the Washington Post to fight for cyber security. John Brennan, the President’s senior advisor on counterterrorism and...
View ArticleIn the World of Cyber Security, It’s Go Time
Once again, America is officially under attack. According to multiple reports, including an "incident response" report from the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT), U.S....
View ArticleThe War of 1812 Redux – Using National Security Tools to Protect the Private...
By Rob Strayer Two hundred years ago today, the United States declared war against Great Britain, beginning the War of 1812. At that time, the British Navy was the aggressor, boarding U.S. commercial...
View ArticleChinese Cyber Attacks Are Looting U.S. Private Sector
One issue that receives too little public attention is the blatant use of hackers by China to steal U.S. intellectual property, defense technology, and other data critical to national security and...
View ArticleLocking Private Sector Shields Against Cyber Attacks
Information travels through America's cyber networks at the speed of light. The legislation that will be used to govern some aspects of network security is traveling at the speed of bureaucracy. The...
View ArticleObservations on the 2012 Aspen Security Forum
The Aspen Institute's Security Forum, held at the end of July, proved why it has become, in only three years, a "must-attend" event for those of us working in the homeland and national security space....
View ArticleGAO Report Shows Weakness of Regulatory Approach in Cyber
The Smart Grid is the way of the future in electricity management, but it also presents cybersecurity challenges. A recent report on Smart Grid Cyber Security from the Government Accountability Office...
View ArticleMaintaining the Status Quo – 2012 National Preparedness Month Presidential...
On the day before the Labor Day weekend, the White House released the President’s latest “National Preparedness Month” Proclamation. Like last year’s, the proclamation employs the term “resilience.”...
View ArticleThe Time Has Come – Recognizing a Need for Regulation in Cybersecurity
After twenty years of rapid growth, we now stand with an unregulated and uncontrolled Internet vulnerable to attack and disruption from anywhere and by anyone on the planet. We have minced around the...
View ArticleAmerica’s Advanced Persistent Asymmetrical Threat
The White House's 2009 Cyber Review estimated the loss of intellectual property from companies as a result of cyber-based hacking in 2008 alone exceeded $1 trillion in value. FBI Director Mueller said...
View ArticleThe Real Danger of a BYOD Strategy
Many companies are examining the possibility of switching to Bring Your Own Device (BYOD) as a method of significantly reducing their IT infrastructure capital costs. Here is but another example of how...
View ArticleCybersecurity Is Not A Partisan Issue
Senate Majority Leader Harry Reid and his congressional colleagues’ proposed Cyber Security Act of 2012 is the wrong solution for America's cybersecurity problem. The split is not between Democrats and...
View ArticleHomeland Security – What Next?
By Doug Doan So far, none of the presidential candidates have mentioned much about Homeland Security. With so many other problems, issues surrounding how best to organize, manage and lead the vast DHS...
View ArticleNot Your Father’s Internet – Mounting Digital Challenges in 2012
There are few spots left around the world without Internet access, and few people who cannot reach out to access it. It has been relatively free of state interference and American dominated. However,...
View ArticleCyber Déjà vu All Over Again – Challenges in 2013
Yogi Berra once observed after two of his teammates smacked back to back homers, “it was déjà vu all over again.” His wisdom applies to cyberspace in 2013 – it is going to be déjà vu all over again....
View ArticlePiracy on the Cyber High Seas
The New York Times recently admitted it had been raided by Chinese “privateers,” stealing reporter’s notes and sources. With this act by the Chinese, we now face clearly the idea that a nation-state...
View Article
More Pages to Explore .....