Reviews the history of FISA, from the foundations of enactment to amendments and decent debates, and how it reflect the system of checks and balances between the three branches of government.
Read MoreEngaging in Cyber Warfare
Defines cyber warfare, justifies the need to establish rules for cyber warfare, and briefly discusses the current cyber war between the United States and China.
Read MoreThe Fight to Define US Cybersecurity and Information Sharing Policy
Reviews the recent political battles over cybersecurity and information sharing policy in the past two years, particularly regarding critical infrastructure.
Read MoreThe Cyber Intelligence Sharing and Protection Act and Online Privacy
Discusses the arguments for the passage of Cyber Intelligence Sharing and Protection Act (CISPA) and elaborates the criticisms made by privacy advocates.
Read MoreMachine-to-Machine Communications
Defines machine-to-machine communications and discusses the benefits and associated risks this technology brings to organizations.
Read MoreViolence in the Workplace
Defines workplace violence and discusses ways to identify early warning signs. Also discusses ways that employers and employees can protect themselves from workplace violence.
Read MoreCrisis Management — What, Why & How?
Evaluates how crisis responses have evolved over the years and how learning from these events has been effectively utilized to abate losses and fatalities.
Read MoreWhat is Big Data?
Defines the term "Big Data" and discusses the challenges organizations are facing with the increasing amounts of data being created each day.
Read MoreMalware Analysis: A Look Into the Past and Future
Discusses the importance of understanding the different types and effects of malware and mentions easy steps on how to protect against such threats.
Read MoreBYOD: Organizational Impacts of Mobile Computing and Convergence
Discusses "bring your own device" policies by providing an in-depth analysis on the associated risks and impacts to businesses.
Read MoreWhistleblowers and the Dodd-Frank Act
Discusses the importance of whistleblowing, the difference between internal and external whistleblowers, and the impact the 2010 Dodd-Frank Act has had on whistleblowers.
Read MoreRisk and the Water Sector
Discusses the potential operational risks associated with the water sector and the impact those risks create.
Read MoreRisks In Energy — Oil and Gas Industry
Discusses the risks faced by the oil and gas industry and how a combined effort between the public and private sectors can effectively mitigate these risks.
Read MoreRisk and the Communications Sector
Discusses the key risks, hazards and vulnerabilities related to the Communications sector from both the public and private perspective.
Read MoreProtecting Critical Infrastructure
Discusses the critical infrastructures of the United States, emerging hacking resources, new threats to the smart grid introduced by technological advances, and concludes with recommendations for ways risk managers can mitigate these threats.
Read MoreEarly Warning Detection Systems
Discusses advances in early warning detection systems associated with natural disasters like fires, floods and earthquakes. Also makes recommendations for risk preparedness plans, including the possibility of using social media for crisis communication.
Read MoreMobile Payment Trends
Discusses the mobile payment trends of near field communication and mobile credit card reading applications – including the potential security risks that accompany them.
Read MoreUnderstanding Google's Privacy Policy Change
Discusses Google's recent privacy policy change, including reactions from online privacy advocates and government representatives from the United States and Europe. Concludes with recommendations for ways users can minimize the information Google collects.
Read MorePacific Northwest Earthquake Risk
Discusses geological factors that make the Pacific Northwest particularly vulnerable to earthquakes. Also makes observations and recommendations about behaviors that help mitigate the earthquake threat.
Read MoreTrends In Data Breaches
Discusses emerging trends in data breaches, including "hacktivism" and cyber warfare. Also includes recommendations to help organizations prepare for major disruptions in communications.
Read More