Thwarting Cybersecurity Attacks Depends on Strategic, Third-Party Investments

10/22/19 Cybersecurity Enable IntenseDebate Comments:  Enable IntenseDebate Comments Companies interested in protecting themselves and their customers from cyber-attacks need to invest in themselves and the vendors that handle their data, according to new research from American University. read more Source: Homeland Security News Thwarting Cybersecurity Attacks Depends on Strategic, Third-Party Investments

The Russian “Dark State” and the Russian Interference in the 2016 U.S. Election

10/22/19 The Russia connection Enable IntenseDebate Comments:  Enable IntenseDebate Comments Elizabeth Wood is a professor of history and the author of Performing Justice: Agitation Trials in Early Soviet Russia;The Baba and the Comrade: Gender and Politics in Revolutionary Russia; and co-author of Roots of Russia’s War in Ukraine. read more Source: Homeland Security News The

What Can We Glean from a Bean: Ricin’s Appeal to Domestic Terrorists

10/22/19 Bioterrorism Enable IntenseDebate Comments:  Enable IntenseDebate Comments In June 2019, FBI leadership testified to the House Oversight and Reform Committee that “individuals adhering to racially motivated violent extremism ideology have been responsible for the most lethal incidents among domestic terrorists in recent years, and the FBI assesses the threat of violence and lethality posed by racially

Climate change: Steep Warming Curve for Europe

10/22/19 Climate threats Enable IntenseDebate Comments:  Enable IntenseDebate Comments Climate is changing: Droughts, floods, and extreme weather events influence agriculture, economy, and society. Improved adaptability of industry and society to the future climate, however, requires reliable statements on medium-term climate development, in particular for certain regions. read more Source: Homeland Security News Climate change: Steep Warming

Cyber security age-gap research shows importance of considering generational differences in strategies

According to a new report on behaviour and attitudes to cyber security among different age groups, employees over the age of 30 are more likely to adopt cyber security best practice than younger colleagues who have grown up around digital technology. Source: Continuity Central News Cyber security age-gap research shows importance of considering generational differences

NIST requests comments on guidance about Resilient Interdomain Traffic Exchange

NIST has released a second public draft of NIST Special Publication (SP) 800-189, Resilient Interdomain Traffic Exchange: BGP Security and DDoS Mitigation. This document provides technical guidance and recommendations for technologies that improve the security and robustness of interdomain traffic exchange. Source: Continuity Central News NIST requests comments on guidance about Resilient Interdomain Traffic Exchange