This Would Be Scary?!? Will A Catastrophic Earthquake Strike The Northwest This Year? The Pacific Northwest Seismic Network Speculates…

The title of this short article definitely caught my eye…”Will a megathrust earthquake strike the NW in 2013????” It brought up several things…such a quake would be incredible destructive, no doubt killing thousands and costing billions in damages. Has earthquake predictions improved significantly recently? What the heck is going on up there in the northwest!??!?!?!… Continue reading This Would Be Scary?!? Will A Catastrophic Earthquake Strike The Northwest This Year? The Pacific Northwest Seismic Network Speculates…

How to Get a Grip on Data With ‘Information Superiority’

In some shape or form, data protection is top of mind for most CIOs these days. It’s no surprise that many CIOs list bring-your-own-device (BYOD)/mobile and cloud computing among the top things that keep them awake at night. Mobile and cloud erase the traditional security perimeter behind which organizations have hoarded their data in the… Continue reading How to Get a Grip on Data With ‘Information Superiority’

Common Sense Guide to Mitigating Insider Threats – Best Practice 1

Hello, this is George J. Silowash, Cybersecurity Threat and Incident Analyst for the CERT Program, with the first of 19 blog posts that describe the best practices fully documented in the fourth edition of the Common Sense Guide to Mitigating Insider Threats. In the coming weeks, my colleagues and I in the CERT Insider Threat… Continue reading Common Sense Guide to Mitigating Insider Threats – Best Practice 1

Top 5 Information Technology Security Predictions for 2013

Louisville, Colo. – Jan. 3, 2013 – As the new year kicks off, Coalfire, an independent IT GRC auditor, compiled their predictions for cybersecurity in 2013. “Last year was a very active year in the cybersecurity world,” said Rick Dakin, CEO and co-founder of Coalfire. “The Secretary of Defense announced that the threat level has… Continue reading Top 5 Information Technology Security Predictions for 2013

Dialogue between public, private and nonprofit sectors can ensure swift deployment of disaster recovery resources

When a disaster strikes, the pre-existing relationships between government and the private sector must be leveraged to launch an effective response and recovery effort. The objective for community crisis response is to support and bolster the capabilities that function effectively in the normal state to function with the same level of success in the emergency… Continue reading Dialogue between public, private and nonprofit sectors can ensure swift deployment of disaster recovery resources

The Largest Natural Hazard Risks of 2012

2012 was a year of natural catastrophes. From Hurricane Sandy to the record-setting drought to the third most destructive wildfire season on record, the year was fraught with disasters that took a toll not only on communities nationwide, but on some of the world’s largest insurers. Today, CoreLogic issued its annual Natural Hazard Risk Summary,… Continue reading The Largest Natural Hazard Risks of 2012

A Big Step to End Data Abuse

From Tuesday, companies have three months to put measures in place before they can collect and use consumers’ personal data for any commercial transactions. IT has been work around the clock for the Personal Data Protection Department (JPDP) since its launch early this year. http://thestar.com.my/news/story.asp?file=/2012/12/30/focus/12517807&sec=focus