Insights / Blog x

Contributors
Cyber Criminals Collaborate To Counteract Threats; So Should We

Cyber Criminals Collaborate To Counteract Threats; So Should We

Every month, a new cyber attack makes headlines, startles consumers, and spurs calls for action and new legislation to mitigate emerging cyber threats. By almost any statistic you choose, the risk to Government agencies, corporations, and consumers is escalating. In 2013, MacAfee catalogued more than 100,000 new pieces of malware a day. The Washington Post reported the likely annual cost of cybercrime to the world economy at $445 billion dollars in 2013, and the number of detected cyber attacks in 2014 increased a staggering 48% over the previous year.

Roadmaps for IT Modernization

Roadmaps for IT Modernization

The risk associated with legacy information technology (IT) systems not meeting the Federal Government’s evolving needs is substantial and unacceptable. The costs are also significant with 78% of the $80 billion spent annually on Federal IT going toward maintaining existing systems, crowding out funding for modernization. 

Enhancing Communications to Protect Against Domestic Terrorism

Enhancing Communications to Protect Against Domestic Terrorism

As the United States faces the growing threat of homegrown violent extremism, the need to fuel widespread neighborhood vigilance and uphold a concerted local effort remains a focal point in preventing terrorism. Successful homeland security efforts require well-informed and proactive communities. Since publishing its first National Strategy in 2002, the Department of Homeland Security (DHS) has engaged citizens by promoting an observant culture throughout American society. 

Remaining Mission-Ready During Transition

Remaining Mission-Ready During Transition

Maintaining organizational stability so the Department of Homeland Security (DHS) can continue its mission during an administration change is critical to keep our nation safe. New agency leaders need access to the basics – organizational information like key policies, organizational charts, mission priorities, current strategy, and dashboards. It is critical, though, to also have access to the current mission status, key issues and risks, and a playbook that allows them to act immediately in the event of a crisis.

Strengthening Security Globally through Shared Biometrics

Strengthening Security Globally through Shared Biometrics

Today's global threat environment is increasingly complex, especially monitoring individuals leaving and entering countries. Events like the terrorist attacks in Paris put increasing mission pressure on the U.S. to properly vet and identify individuals entering and exiting the country. Refugees from countries of unrest, such as Syria, further complicate this mission challenge.

Can a Government Program Create Brand Loyalty?

Can a Government Program Create Brand Loyalty?

In an environment of limited resources, the Department of Homeland Security (DHS) and its components face the challenge of creating loyal stakeholders as a means to stay relevant and obtain sustained funding. In the many mission areas across DHS, there are valuable, unique programs that must grow and develop to meet the ever-increasing needs of demanding stakeholders.

Security in Cyberspace

Security in Cyberspace

Recent large-scale cybersecurity incidents have highlighted the need for increased vigilance and defense against information security threats that affect organizations worldwide. Hackers stole the personal data of more than 21 million people in the Office of Personnel Management (OPM) Breach in 2015. These cyber-attacks resulted in the theft of personal information of millions of Americans, many of whom are current or former Federal workers and contractors. Stolen information enables hackers to conduct individual targeted cyber-attacks, such as spam and phishing campaigns. Individuals, businesses, and other organizations must stay aware of emerging threats and act quickly to secure their data and networks.

See Something, Change Something

See Something, Change Something

In today’s world of evolving technology, we expect a certain level of “intimacy” with our data. We are no longer just passive receivers of data, but involved participants that create and distribute it. With the rise of crowd-sourced information, society increasingly demands this immediate and accurate information, and compels the people to provide it.

The Power of Proper Negotiation to the Homeland Security Mission

The Power of Proper Negotiation to the Homeland Security Mission

A refugee crisis on the heels of war. A sudden diaspora in response to a spreading disease. A natural disaster displacing thousands of international citizens.

These are three very real scenarios that the United States government and the international community have had to face in the past year alone, and three cases that make negotiating across ethnic lines that much more important to the homeland security mission. In times of crisis, disagreements are inevitable, but knowing how to properly address them in creating a plan of action can mean the difference between coming to a mutual agreement or severing a working relationship.

Cultivating Mission Performance through Risk Management

Cultivating Mission Performance through Risk Management

Scientists predict that the next full-margin rupture of the Cascadia subduction zone will produce the worst natural disaster in the history of North America. With many experts suggesting we are overdue for the “big one,” it is critical for the Department of Homeland Security (DHS) to incorporate effective risk management methods within their mission-critical, national, and high profile programs to improve their ability to prepare for, protect against, respond to, and recover from the potentially devastating effects of this imminent threat.

In Plain View: Making Open Source Intelligence a Priority

In the virtual public square, the most valuable intelligence might not be so secret. In fact, the intelligence might be in plain view. During the trial of Dzhokhar Tsarnaev, the public discovered that the Boston Marathon bombers learned how to build their weapons not in a clandestine operation, but from Al-Qaeda’s public and free online magazine, Inspire. Everything the Tsarnaevs knew about terrorism came from open source information.