Category: IA News

This week, two Department of Homeland Security officials testified before a congressional panel on President Obama’s proposal on cybersecurity information sharing…

... Read More

Earlier in February, the RAND Corporation released a report documenting lessons learned while establishing the Guatemalan Interagency Task Force Tecún Umán. The IATF was established for the interdiction of drug flow across the Mexican border…

... Read More

Last week, Stanford University hosted the White House Summit on Cybersecurity and Consumer Protection. The summit centered around cybersecurity information sharing and the efforts private industry is taking to better protect the data of their customers…

... Read More

On February 13, President Obama signed an Executive Order to encourage and promote sharing of cybersecurity threat information within the private sector and between the private sector and government…

... Read More

On Tuesday, February 10, the White House announced that it is creating a new office to sort through intelligence data about cyber threats and combat cyber attacks…

... Read More

Last Friday, the White House released President Obama’s new National Security Strategy, which builds on the progress of the last six years, and provides a vision and strategy for advancing the nation’s interests…

... Read More

Last year, Business Executives for National Security published a report reviewing U.S. domestic security. The BENS report assesses whether the many reforms enacted after 9/11 are still effective at confronting a changing terrorist threat…

... Read More

In an interview earlier this week, Chairman of the Joint Chiefs of Staff General Martin Dempsey spoke about U.S. vulnerabilities to cyber attacks. The Chairman specifically addressed threats to civilian and private infrastructure…

... Read More

The Government Accountability Office recently released an audit report that assesses the extent to which the Department of Homeland Security and other federal facilities are prepared to address cyber risk to building and access control systems…

... Read More
1 36 37 38 39 40 58
  • "*" indicates required fields

    SUBSCRIBE TO THE NEWSLETTER

    Sign up to receive updates by email. We do not sell or share your info.

    This field is for validation purposes and should be left unchanged.