The new Donald Trump administration will attempt to manage many challenges, but cannot eliminate them. After all, these forms of political violence have existed since time immemorial and will continue for generations.
The U.S. power grid is in the process of an enormous transformation into a smart grid
September 1, 2014
According to Security Implications of the Smart Grid, a report from Marie Wright, PhD, of Western Connecticut State University, and Robert Billings, Jr., B.A., of Billings Electric, the shift to a smart grid infrastructure means that power companies will be using more IP-based communications and commercial, off-the-shelf technologies.
Travel risk mitigation plans should protect all employees, including travelers, expatriates and emerging market employees, and there should be a focus on Duty of Care. The plans should include clear and comprehensive policies governing business travel as well as the ability to locate and communicate with travelers within minutes of a significant event.
The past several years have seen the emergence of a more aggressive set of AQ affiliates and likeminded groups
June 1, 2014
The tactical guidance by AQ leader Ayman al-Zawahiri to minimize collateral damage was routinely disobeyed, notably with respect to increasingly violent attacks by AQ affiliates against civilian religious pilgrims in Iraq, hospital staff and convalescing patients in Yemen, and families at a shopping mall in Kenya.
Spurred on by the arrest of a Dutch teenager identified as “Sarah” in Rotterdam on Monday, who tweeted “hello my name’s Ibrahim and I’m from Afghanistan. I’m part of Al Qaida and on June 1st I’m gonna do something really big bye," dozens of teens are now tweeting bomb-threat jokes to American Airlines.
The Department of Homeland Security issued a bulletin Wednesday warning airlines of possible attempts to attack passenger jets using explosives packed in shoes, Fox News reports. The threat is described as being unrelated to the Sochi Olympics.
Terrorism has emerged in the last decade as one of the most critical issues with which governments must contend, topping most Western nations’ agendas in terms of resource allocation. For example, some reports indicate the United States has spent more than one trillion dollars waging the “War on Terror” – money and resources that may have been allocated very differently in the absence of such threats.
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!