Recent national events, such as the health crisis and geopolitical tensions, have caused budget reductions across the public safety community. To help state, local, tribal, and territorial government agencies maintain or adjust their budgets in a time of constrained funding, SAFECOM and the National Council of Statewide Interoperability Coordinators (NCSWIC) developed Contingency Considerations When Facing Reductions in Emergency Communications Budgets fact sheet to provide a series of contingency considerations to justify investment in four mission-critical resource categories: personnel, operating costs, equipment, and software.
The U.S. Department of Homeland Security Cybersecurity and Infrastructure Security Agency (CISA), Indianapolis Motor Speedway, state and local first responders, law enforcement officials, and local businesses held a tabletop exercise to test response plans around hypothetical public safety incidents on the day of the Indianapolis 500, scheduled for Sunday, May 30. Representatives from multiple government agencies and the community discussed their roles, shared best practices, and improved coordination mechanisms to help keep the public safe. The exercise is part of an ongoing public safety efforts surrounding the Indianapolis 500 and was not in response to any specific threat.
Netenrich announced the appointment of Christopher Morales as Chief Information Security Officer (CISO) and Head of Security Strategy to its leadership team. Morales will oversee the strategic development, implementation, and market execution of the company’s security solutions and processes.
As we embark on the long-haul journey to distribute the COVID-19 vaccine to all Americans, addressing the communication challenges of this distribution has never been more vital for safety and coordination, says David Wiseman, Vice President of Secure Communications at BlackBerry. Here, we talk to Wiseman about the need for unified communications as states implement vaccine rollout strategies.
A security team can sink an infinite amount of time and resources into strengthening your infrastructure, but it’s all for nothing if a default password is used by an exec, or someone in HR makes the mistake of responding to a clever phishing message.
Cybercriminals will always find the path of least resistance and for most organizations the easiest way in is through the people.
The National Security Agency (NSA), the Cybersecurity and Infrastructure Security Agency (CISA), and the Federal Bureau of Investigation (FBI) jointly released a Cybersecurity Advisory, “Russian SVR Targets U.S. and Allied Networks,” to expose ongoing Russian Foreign Intelligence Service (SVR) exploitation of five publicly known vulnerabilities. This advisory is being released alongside the U.S. government’s formal attribution of the SolarWinds supply chain compromise and related cyber espionage campaign. We are publishing this product to highlight additional tactics, techniques, and procedures being used by SVR so that network defenders can take action to mitigate against them.