Policy & Practice

Security watch lists exist for good reasons, whether to keep track of people suspected of having ties to terrorist organizations or to track known sex offenders, felons or substance abusers.…

In May the Pentagon published a change to the National Industrial Security Operating Manual (NISPOM), requiring contractors to “establish and maintain an insider threat program to detect, deter and mitigate…

After years of deliberation, the Department of Defense has published Change 2 to its National Industrial Security Operating Manual (NISPOM). With this release, DoD requires the cleared community to formally…

Former Department of Homeland Security official Paul Rosenzweig has issued a long-overdue call for wholesale revisions to US homeland security doctrine, in reaction to fundamental changes in the security landscape…

Like human hygiene, organizations must maintain regular cyber hygiene for healthy outcomes, but it’s critical they don’t neglect the tools and processes that mitigate cyber risk — the most serious…

Chriss Knisley, President Haystax Technology A disturbing pattern has emerged in the recruiting tactics of hyper-violent organizations like ISIS: nearly all foot soldiers who have carried out mass-casualty attacks recently…

Haystax cybersecurity expert Marvin Marin, CISSP-ISSMP, C|CISO, CCSK, eJPT, FQNV, MBCS, was recently featured in ISACA’s newsletter for the Washington, D.C. metro area. Marin wrote about the significant value that…

By Marvin Marin and Andrew Paulette With the dramatic rise in internet access and use over the past decade, it is easier than ever for companies to reach an audience…

The nation’s second-largest public school system, Los Angeles Unified School District, shut down on Tuesday after receiving what was deemed a “credible threat” of violence via email. New York schools,…