News

The escalating cyber activities of a threat actor known as "Mr. Hamza" demonstrate the ongoing sophisticated threats facing government institutions, critical infrastructure, and intelligence agencies ...
Arcfield launched as the new company name of what was previously CTFV Acquisition Corp. which comprised Peraton’s divested Systems Engineering, Integration, and Support Services (SES) Business.
U.S. Department of Defence Contracts for June 13, 2025. Air Force Staff Sgt. Justin Paddock shines a light into an engine component of an F-16 Fighting Falcon aircraft while performing an inspection ...
Please wait while your request is being verified ...
Prioritizing Cybersecurity Vulnerabilities The cyber component of a holistic threat landscape continues to evolve in 2025, presenting homeland security professionals with challenges that are ...
Emergency Management, whether conceived as a management system or an operational unit of government, should not be in the ‘business’ of managing global pandemics.
Space capabilities, technology, applications, and services represent the forefront of technological development for the homeland security enterprise. Space capabilities and technological innovations ...
Protecting the sanctity of our water supply is not merely an environmental concern, it is a critical national security priority and challenge. As demand for water increases due to population growth, ...
Imagine a scenario where on January 20th, the new U.S. President, who just swore to defend the U.S. Constitution, approaches the podium to give the much-anticipated inaugural speech. Members of ...
Millions of U.S. taxpayer dollars end up in Taliban pockets every week, according to a new video shared by Jazz Cannon on LinkedIn, featuring a conversation between an Afghan-American veteran and ...
The National Counterintelligence and Security Center (NCSC) has released a comprehensive report on insider threat mitigation for U.S. critical infrastructure, highlighting the growing risk posed by ...
Lone-actor terrorism has increasingly become a significant threat in recent years, with perpetrators using easily accessible and often devastating tactics. Among the most common methods are ...