• The Heritage Network
    • Resize:
    • A
    • A
    • A
  • Donate
  • Cybersecurity: Government Regulations Can’t Keep Up

    For the first time since 2005, the U.S. National Institute of Standards and Technology (NIST) has revised the federal cybersecurity standards. Since the last update, flash memory, Wi-Fi, smartphones, microchips, and social media have burst onto the scene. Why has NIST not updated the federal cybersecurity standards much sooner? Because … More

    Contrary to Popular Belief, Drones Not All Bad

    Last week, Politico published an article on America’s misconception of drones, and why those misconceptions can, and should, be remedied. As technology advances, the ways in which it can be exploited grows. Drones are no exception. While steps need to be taken to ensure that privacy rights are protected from … More

    Legal Immigration: What About Those that Followed the Law?

    We’re taught from a young age to “wait your turn” and “don’t cut in line,” but what about when we take those lessons from the playground to real life? For close to 4.5 million people waiting in line to come to the U.S. today, this is a very real question. … More

    7 Steps to Solve Congressional Cyber Stalemate

    Congress is back in session and “ready” to tackle cybersecurity. Regrettably, some in Congress are again proposing 19th century–style legislative solutions to this ultimately 21st-century problem. Let’s hope they think it through this time before offering the same failed ideas. Over the past several months, the world has witnessed a … More

    Internet Hit by Largest Cyber Attack Yet

    This week, the largest cyber attack to date hit the Internet. Spamhaus, an anti-spam company, placed Cyberbunker on their black-list of spam generating companies. Cyberbunker quickly retaliated with a Distributed Denial of Service (DDoS) attack, which essentially overwhelms a system with requests. The initial attack failed to overwhelm Spamhaus and … More

    Travelers Need a Vacation from the Burdensome Visa Application Process

    Who doesn’t love a good vacation? A vacation, by definition, should be relaxing. If one has to fill out a lengthy form, be interviewed in person, and then wait for weeks to see whether or not they “passed” in order to go on vacation, that kind of defeats the purpose. … More

    Sequestration Cuts the DHS Off at the Knees

    Last week, Democrats on the House Appropriations Committee released a report outlining what they believe the consequences of sequestration will be if it goes into effect. Following its release, Homeland Security Today published an article highlighting the report’s findings on the Department of Homeland Security (DHS) specifically. In short, the … More

    Chinese Hackers Target U.S. Newspapers

    For more than four months, hackers based in the People’s Republic of China have been attacking The New York Times, the paper reported last week. The cyber attacks started on October 25, 2012—the same day the Times published an investigative piece illuminating the wealth the family of China’s Prime Minister … More

    Cyber Command Expansion Threatened by Budget Cuts

    The Pentagon has approved a 500 percent personnel increase for Cyber Command—which protects the Pentagon’s information networks and engages in cyberspace operations—according to The Washington Post. In a world where cyber is becoming an increasingly important realm, few would disagree with the U.S. government’s desire for increased cyber capabilities. However, … More