In the Justice & Public Safety ecosystem, there is a critical need to stop all removable media and devices from entering an agency’s secured network prior to being fully scanned…
Learn MoreWith federal, state and local agencies frequently operating independently, the need for efficient and effective communication and coordination has never been more important. The ability to collect, process and manage…
Learn MorePublic safety agencies have started using small unmanned/uncrewed aircraft systems (UAS), also known as “drones,” for a variety of purposes, including communications support, transportation, situational awareness, and search and rescue.…
Learn MoreThe goal of the National Institute of Standards and Technology's (NIST) Public Safety Communications Research (PSCR) program's Usability Team was to provide guidance on the usability of public safety communication…
Learn MoreThe corrections and probation environments of today are required to accommodate all the latest digital advancements and access requirements technology has to offer. Agencies are scrambling to ensure systems provide…
Learn MoreIn the digital era, law enforcement and public safety agencies have access to volumes of valuable data: information on operations, locations and trends derived from service calls, patrol reports and…
Learn MoreImpacts of wildland-urban interface (WUI) fires continue to rise in the US, evidenced by the string of devastating and record-breaking events occurring since 2017. As seen in several events in…
Learn MoreOn March 13, 2024, the House of Representatives passed the Protecting Americans from Foreign Adversary Controlled Applications Act (H.R. 7521). If enacted, H.R. 7521 would make it unlawful to provide…
Learn MoreBehavioral Threat Assessment and Management is a recognized, best practice approach for preventing targeted violence that helps bridge the gap between identifying potential threats and mitigating them—and allows organizations to…
Learn MoreWhen it comes to safeguarding your data, immutable backup is your ultimate defense. Immutability isn’t just about preserving data; it ensures that your backups are tamper-proof, resistant to breaches, and…
Learn MoreContinually test your playbook and response plan over time. Invite all staff who will have responsibilities to prevent or respond to attacks: This should include (but is not limited to)…
Learn MoreIt’s every IT department’s worst nightmare – all the servers go down in your building, due to a ransomware attack or other disaster, and you don’t know how long it…
Learn MoreDisaster Recovery is a term that gives those responsible for IT sleepless nights, and no wonder. Restoring critical systems, applications, and data that have been corrupted or taken hostage in…
Learn MoreThis paper serves as ATARC’s State and Local Cyber Grants Working Group’s document building upon their “Baseline Cybersecurity Best Practices: An Overview for Success in Applying for the State and…
Learn MoreAt the U.S. Department of Transportation, safety is their top priority. Yet, in recent years, we have seen alarming increases in roadway deaths. After spiking during the pandemic, these numbers…
Learn More