Contributors
Cyber Criminals Collaborate To Counteract Threats; So Should We

Cyber Criminals Collaborate To Counteract Threats; So Should We

Every month, a new cyber attack makes headlines, startles consumers, and spurs calls for action and new legislation to mitigate emerging cyber threats. By almost any statistic you choose, the risk to Government agencies, corporations, and consumers is escalating. In 2013, MacAfee catalogued more than 100,000 new pieces of malware a day. The Washington Post reported the likely annual cost of cybercrime to the world economy at $445 billion dollars in 2013, and the number of detected cyber attacks in 2014 increased a staggering 48% over the previous year.

Roadmaps for IT Modernization

Roadmaps for IT Modernization

The risk associated with legacy information technology (IT) systems not meeting the Federal Government’s evolving needs is substantial and unacceptable. The costs are also significant with 78% of the $80 billion spent annually on Federal IT going toward maintaining existing systems, crowding out funding for modernization. 

Enhancing Communications to Protect Against Domestic Terrorism

Enhancing Communications to Protect Against Domestic Terrorism

As the United States faces the growing threat of homegrown violent extremism, the need to fuel widespread neighborhood vigilance and uphold a concerted local effort remains a focal point in preventing terrorism. Successful homeland security efforts require well-informed and proactive communities. Since publishing its first National Strategy in 2002, the Department of Homeland Security (DHS) has engaged citizens by promoting an observant culture throughout American society. 

Arc Aspicio Named One of 2016 Seven to Watch by Consulting Magazine

Arc Aspicio Named One of 2016 Seven to Watch by Consulting Magazine

Arlington, VA, February 12, 2016 – Arc Aspicio announced that Consulting Magazine named the company to the list of the Seven Small Jewels to Watch for the upcoming year.

Consulting Magazine is a leading publication for consulting, offering insights on consulting careers, thought leadership, and corporate strategies. Consulting Magazine annually recognizes growing companies, strong leadership, and accomplished consultants.

Remaining Mission-Ready During Transition

Remaining Mission-Ready During Transition

Maintaining organizational stability so the Department of Homeland Security (DHS) can continue its mission during an administration change is critical to keep our nation safe. New agency leaders need access to the basics – organizational information like key policies, organizational charts, mission priorities, current strategy, and dashboards. It is critical, though, to also have access to the current mission status, key issues and risks, and a playbook that allows them to act immediately in the event of a crisis.

Strengthening Security Globally through Shared Biometrics

Strengthening Security Globally through Shared Biometrics

Today's global threat environment is increasingly complex, especially monitoring individuals leaving and entering countries. Events like the terrorist attacks in Paris put increasing mission pressure on the U.S. to properly vet and identify individuals entering and exiting the country. Refugees from countries of unrest, such as Syria, further complicate this mission challenge.

Can a Government Program Create Brand Loyalty?

Can a Government Program Create Brand Loyalty?

In an environment of limited resources, the Department of Homeland Security (DHS) and its components face the challenge of creating loyal stakeholders as a means to stay relevant and obtain sustained funding. In the many mission areas across DHS, there are valuable, unique programs that must grow and develop to meet the ever-increasing needs of demanding stakeholders.

Security in Cyberspace

Security in Cyberspace

Recent large-scale cybersecurity incidents have highlighted the need for increased vigilance and defense against information security threats that affect organizations worldwide. Hackers stole the personal data of more than 21 million people in the Office of Personnel Management (OPM) Breach in 2015. These cyber-attacks resulted in the theft of personal information of millions of Americans, many of whom are current or former Federal workers and contractors. Stolen information enables hackers to conduct individual targeted cyber-attacks, such as spam and phishing campaigns. Individuals, businesses, and other organizations must stay aware of emerging threats and act quickly to secure their data and networks.