“The U.S. government’s chief tool to coordinate responses to bioterror events has for years suffered from big security problems, according to Homeland Security Department inspectors and a former employee. For more than 15 years, the United State’s first line of defense against a major biological incident has been a program called BioWatch. Its sensors, mounted
“The Defense Department and Office of Personnel Management expect to have merged two offices and moved 2,000 federal employees and a 600,000-case backlog of security clearance investigations nine months from now. The new office will be established under the Defense Security Service by Oct. 1, Director for Defense Intelligence Garry
How do you compare and test the efficacy of cybersecurity products and companies when the information is proprietary? In many situations, you cannot. The research division of DHS is currently trying to understand how comparisons could be possible that are based on rational actor notions. With cybersecurity companies selling their
“The Department of Homeland Security wants to create a social network that businesses can use to exchange advanced knowledge of cyberattacks, an effort that echoes what a number of private sector organizations have created but is intended to operate on a larger scale. In a pre-solicitation statement, the agency said
DHS and the FBI shared a joint alert on December third regarding the critical infrastructure threat posed by the Iranian SamSam virus. The ultimate purpose of the virus is the successful intrusion and takeover of a network for the purpose of extorting a ransom (ransomware). The alert recommended strong passwords,
“Homeland Security Secretary Kirstjen Nielsen and Defense Secretary Jim Mattis spearheaded an agreement signed last week about how their agencies will work together on future cybersecurity challenges, Homeland Security Undersecretary Chris Krebs said last week. The pair is also urging more cyber cooperation between military and civilian government, Krebs said.
“Despite a few scares, there is no evidence of any cyberattacks against election infrastructure Tuesday, DHS officials said. As expected, federal officials spent much of the day chasing down anomalies that appeared to have a cyber angle, though all turned out to be typical malfunctions or accidents. For example, in
“The Homeland Security and Defense Departments don’t expect a significant cyber attack on next week’s elections. But both agencies are eager to avoid a repeat of 2016, so just in case, military Cyber Protection Teams are on standby and able to respond ‘within hours,’ a senior Pentagon official told reporters.
“Drone manufacturers may be scooping up sensitive videos of crime scenes, electric grids, and other critical infrastructure under terms of service that give them access to the data, Department of Homeland Security and Federal Aviation Administration officials say. More than a million unmanned aircraft systems (UAS) have taken to the sky in
“Various data on up to 35 million U.S. voters as many as 19 states is for sale online, according to a new report from a pair of cyber security research firms. But the Department of Homeland Security says that’s nothing new: much of the data is either public or available