Central Americans will continue to flee to the U.S. if they do not have another viable alternative. We need to give them one.

While a leadership shake-up at the Department of Homeland Security may have spun last week's news cycles, solving humanitarian and border security challenges requires a deeper understanding of migration drivers and influences that contribute to mass immigration. We must look beyond the border region itself to understand where we can make strategic investments and find policy solutions that will garner permanent results. To that end, we must tackle the root causes at each stage of the migration journey.
Full Article

In January of 2019, the Clemson Tigers and Alabama Crimson Tide competed at one of the largest sporting events in the country: The National Collegiate Athletic Association’s (NCAA) fifth National Championship game of the College Football Playoffs. There were 75,000 fans in attendance. 

Events like these are vulnerable to a host of security risks. In fact, the event was monitored by students from Norwich University’s Applied Research Institute (NUARI) who used artificial intelligence decision automation software (Norwich used Respond Software) to monitor, analyze and resolve more than 243,000 events and threats during the game. There were 200,097 threats that required deeper investigation; the team diagnosed 431 as malicious and mitigated 13 events that specifically targeted the stadium. The game seamlessly took place without trouble.

Full Article

One only needs to open their favorite homepage or scan ubiquitous media feeds to know that security professionals face an increasingly complex and ever-changing risk landscape, filled with uncertainty and contingency. While zero-day vulnerabilities, ransomware and unpatched software continue to pose significant threats themselves, a new and potentially more dangerous threat continues to grow within the corporate environment – one’s own employees.  For example, an April 2018 Ponemon Institute survey of IT security professionals across 700 organizations reported that the average cost of a single breach due to employees or others with access was over $8.7 million

Full Article

Over the past several years, the law enforcement community has grown increasingly concerned about the conduct of digital investigations as technology providers enhance the security protections of their offerings—what some of my former colleagues refer to as “going dark.”

Data once readily accessible to law enforcement is now encrypted, protecting consumers’ data from hackers and criminals. However, these efforts have also had what Android’s security chief called the “unintended side effect” of also making this data inaccessible to law enforcement. Consequently, many in the law enforcement community want the ability to compel providers to allow them to bypass these protections, often citing physical and national security concerns.

Full Article

Medical device manufacturers grappling with a multitude of cybersecurity issues await final direction from the federal government on better protecting patients and managing risk.

The comment deadline is March 18 for the Food and Drug Administration’s draft premarket cybersecurity guidance. The proposed guidance provides updated recommendations for device manufacturers on how they can better protect their products from risks like ransomware or a catastrophic attack on a health system.

Full Article

Walled off inside the National Security Agency complex in Fort Meade, Md., leaders of U.S. Cyber Command are preparing for digital combat against state-backed hackers targeting critical energy infrastructure.

The top-secret work comes after a decade of relentless probing by cyber units from Russia and China. It follows two years of sobering revelations about accelerating efforts by America's adversaries to break into electric grid and pipeline control rooms.

Full Article

The Industrial Internet of Things (IIoT) sees networks of connected industrial devices working together to collect and analyze data in order to help deliver new insights and optimize business processes. It can range from the smallest sensors to large industrial equipment.

Full Article

As a political standoff shut down the government for 35 days, homeland security professionals scrambled to continue the mission. From Russia to China, to cyber attacks and near daily mass shootings, read on for where we should focus as a nation and in our communities. We reached out to our cadre of experts to ask: What are the real worries?

Full Article

When a large-scale cyberattack hits the US, the government and the private sector must have recovery plans in place to share resources and mitigation strategies, according to a Tuesday report from the Foundation for Defense of Democracies (FDD) and the Chertoff Group.

Full Article

As a political standoff shut down the government for 35 days, homeland security professionals scrambled to continue the mission. From Russia to China, to cyber attacks and near daily mass shootings, read on for where we should focus as a nation and in our communities. We reached out to our cadre of experts to ask: What are the real worries?

Full Article
Schedule a Consultation

Contact us today to learn what we can do for you.

Schedule a Consultation