Policy & Practice

school safety

We all know that communities across the country expect and deserve a school environment where children can learn and develop while feeling safe. Today’s challenge is figuring out what we…

security analytics

Is the European Union’s General Data Protection Regulation (GDPR) a game-changer for security analytics? The regulation enters into force on May 25, and in this regard its 99 articles and…

insider threat

Companies across a wide spectrum of industries continue to wrestle with how to implement a well-designed insider threat program. The US government has provided guidelines that help but, as we’ve…

insider threat

Is Lord Varys, the enigmatic eunuch, a threat to Daenerys Targaryen’s army? As any Game of Thrones fan knows, Varys is currently an advisor to Daenerys. With the help of…

The explosive growth of cloud-based services and mobile devices in the workplace has rendered conventional approaches to cybersecurity risk management virtually obsolete, requiring a more adaptive and continuous strategy towards…

Security analytics

Companies take time to screen their potential employees during the application process, and government-job seekers undergo many additional investigative procedures, too. And yet once an individual is hired, the vetting…

Insider threat

Last fall, just three years after the massive Edward Snowden leak, Harold Martin III – another government contractor – was charged with allegedly stealing highly classified documents from the National…

Insider Threat, Security Analytics

Many policy objectives were ardently debated throughout the 2016 presidential election cycle and became polarizing issues, dividing people chiefly along party lines. By contrast, the twin issues of improved insider…

Cyber security

In earlier blogs, (here and here) we discussed weaknesses of the new industrial insider threat program regulation, the National Industrial Security Operating Manual (NISPOM) Change 2. As the November 30…