Hurricane Florence’s devastation has been felt across North Carolina. The storm, which was thought at one point to make landfall as a Category 4 hurricane, made landfall on September 13, 2018, as a Category 2. In the days leading up to the storm, as many as 1.7 million people were told to evacuate the coast and emergency measures were enacted to protect life and critical assets.
On Friday, September 21, 2018, the Ottawa region and western Quebec experienced a series of tornadoes that left a trail of destruction across many communities. However, three things went really well during the tornado response.
The children born on 9/11 will turn 17 this year, which means they have no living memory of the day’s events in New York, Washington, D.C., and Pennsylvania. But as they come of age, they do have the potential to be a major force for social change.
During the last three decades, the tools and tactics employed by terrorists and other violent extremists have changed dramatically as they rapidly adapt and evolve.
Only 13.9 per cent of respondents to the 2012 survey indicated that their organization had an internal working definition of the term. The results of the 2017–2018 survey demonstrate that some minor progress has been made on implementing this recommendation.
Building cyber resilience is about more than preventing attacks; it’s about being able to limit the impact of attacks that do occur, and being able to resume regular business faster.
It’s possible for incidents like this to be leveraged and used by others, including nation states, to generate societal friction and amplify divisions, thereby constituting a potential national security threat.
One of the biggest challenges we face in cyber security is the swift evolution of the threat landscape. With increasing complexity, rapid adoption of new technologies, and emerging risks such as zero-day vulnerabilities, it is impossible to guarantee that any system is 100 per cent secure.
Examining organizational confidence around identifying and managing insider threats.
The actions of an insider posing a threat, whether malicious or not, can have catastrophic results. In fact, perfectly functioning security practices that are focused on mitigating external threats can fail to prevent, or even exacerbate the impact of insider threats.