“The U.S. government’s chief tool to coordinate responses to bioterror events has for years suffered from big security problems, according to Homeland Security Department inspectors and a former employee. For more than 15 years, the United State’s first line of defense against a major biol...
Posts Tagged: Department of Homeland Security
How do you compare and test the efficacy of cybersecurity products and companies when the information is proprietary? In many situations, you cannot. The research division of DHS is currently trying to understand how comparisons could be possible that are based on rational actor notions. With cybers...
“The Department of Homeland Security wants to create a social network that businesses can use to exchange advanced knowledge of cyberattacks, an effort that echoes what a number of private sector organizations have created but is intended to operate on a larger scale. In a pre-solicitation stateme...
DHS and the FBI shared a joint alert on December third regarding the critical infrastructure threat posed by the Iranian SamSam virus. The ultimate purpose of the virus is the successful intrusion and takeover of a network for the purpose of extorting a ransom (ransomware). The alert recommended str...
“Homeland Security Secretary Kirstjen Nielsen and Defense Secretary Jim Mattis spearheaded an agreement signed last week about how their agencies will work together on future cybersecurity challenges, Homeland Security Undersecretary Chris Krebs said last week. The pair is also urging more cyber c...
“Despite a few scares, there is no evidence of any cyberattacks against election infrastructure Tuesday, DHS officials said. As expected, federal officials spent much of the day chasing down anomalies that appeared to have a cyber angle, though all turned out to be typical malfunctions or accident...
“Various data on up to 35 million U.S. voters as many as 19 states is for sale online, according to a new report from a pair of cyber security research firms. But the Department of Homeland Security says that’s nothing new: much of the data is either public or available...
“Malicious hackers are using vulnerabilities in third party suppliers to gain access to government entities and critical infrastructure, according to a recent alert by the Department of Homeland Security’s United State’s Computer Emergency Readiness Team. ‘Since at least May 2017, threat act...