Capital, House of Representatives, Congress, Senate

Sen. John Cornyn, R-Texas, today introduced the Advancing Cybersecurity Diagnostics and Mitigation Act in the Senate. The House version of the bill (HR 6443), sponsored by Rep. John Ratcliffe, R-Texas, passed the House earlier this month. […]

Kirstjen Nielsen DHS
Hurricane Florence

The Department of Homeland Security’s National Cybersecurity & Communications Integration Center (NCCIC) is warning users “to remain vigilant for malicious cyber activity seeking to exploit interest in Hurricane Florence.” Alongside these recommendations, the Multi-State Information Sharing & Analysis Center (MS-ISAC) released a cyber intel advisory on Sept. 14, which notes an uptick in internet activity related to Florence.






[…]

Department of Homeland Security DHS

The Department of Homeland Security Science and Technology Directorate (DHS S&T) today announced awards to five research organizations as part of a new program aimed at identifying network and internet disruptions that could “significantly impact critical infrastructure systems” and “other essential systems on which society is dependent.”






[…]

Cybersecurity flag

As the list of primary threats to the United States continues to evolve, the Department of Homeland Security is evolving to meet them with new operations such as the National Risk Management Center (NRMC) the agency announced in July, said Matthew Travis, deputy under secretary for DHS’ National Protectorate and Programs Directorate (NPPD), today at an event organized by the Professional Services Council.






[…]

election voting

The National Academies of Sciences, Engineering, and Medicine (NASEM) is the latest in a string of organizations to release its recommendations on how Federal, state, and local officials can best secure U.S. elections, including the use of paper-ballot components.






[…]

Department of Homeland Security DHS

The Department of Homeland Security (DHS) is focused on modernizing its mindset to tackle a host of pressing issues including reducing its reliance on legacy systems, competing to attract cybersecurity talent, and combating supply chain threats, said DHS CIO Dr. John Zangardi today at the Billington Cybersecurity Summit.






[…]

DHS Homeland Security

Along with a slew of IT-related bills concerning the Department of Homeland Security and addressing supply chain risk and cyber monitoring, the House of Representatives also voted on Tuesday night to approve the establishment of a chief data officer (CDO) at DHS.






[…]

supply chain risk management process automation

The House of Representatives on Tuesday agreed by voice vote to approve HR 6430, the Securing the Homeland Security Supply Chain Act of 2018, which grants the Department of Homeland Security (DHS) Secretary authority to exclude certain contractors from doing business with the Federal government to address “urgent national security interests” and curb supply chain risks.






[…]

Election security, voting, midterms 2018

Bob Kolasky, director of the Department of Homeland Security’s (DHS) recently created National Risk Management Center (NRMC), said today that DHS is taking action this month to boost the level of communication and data exchange among state and local election officials in the run-up to the U.S. midterm elections in November.






[…]

John Ratcliffe

The House of Representatives today approved by voice vote HR 6443, the Advancing Cybersecurity Diagnostics and Mitigation Act, which would codify the Department of Homeland Security’s (DHS) Continuous Diagnostics and Mitigation (CDM) Program into law.






[…]

Senator Dan Sullivan Sen. Arkansas

A pair of U.S. senators wrote to the heads of the Department of Homeland Security (DHS) and Federal Bureau of Investigation (FBI) on Friday, imploring them to work with social media companies to root out election interference on their platforms and asking the agency heads for more information on the steps they’ve already taken to do so.






[…]

Department of Homeland Security DHS
Look at that plane taking off at an airport.

The Department of Homeland Security’s (DHS) Science and Technology Directorate (S&T) awarded $3.5 million in research and development funding to improve detection capabilities of X-ray technology used for checked baggage systems at U.S. airports.






[…]

Kevin Cox CDM Program Manager Continuous Diagnostics and Mitigation Program DEFEND

All 23 of the Federal civilian CFO Act agencies covered under the Department of Homeland Security’s Continuous Diagnostics and Mitigation (CDM) Program will be connected to the governmentwide cybersecurity threat dashboard by September, CDM Program Manager Kevin Cox said today.






[…]

IoT City Cyber modernization chip internet of things

The ransomware attack on the city of Atlanta in March of this year, which brought down numerous online city services for several days, should be seen as a warning for similar attacks on municipalities in the future with even more drastic impacts as city services become more reliant on IT systems, a senior Department of Homeland Security official said Tuesday.






[…]

Government use of facial recognition technology put one in the win column last week, when U.S. Customs and Border Protection (CBP) officers nabbed a man using a fake passport to enter the country at Dulles International Airport in Virginia.






[…]

The Department of Homeland Security Science and Technology Directorate (DHS S&T) said today that it will conduct a series of systematic reviews this fall, in coordination with the Campbell Collaboration and in partnership with Australia, Canada, Sweden, and the United Kingdom, aimed at preventing acts of targeted violence and terrorism.






[…]

Department of Homeland Security DHS

Matthew Travis, deputy undersecretary of the Department of Homeland Security’s National Programs and Protection Directorate (NPPD), said today that DHS’s recently-established National Risk Management Center (NRMC) represents the agency’s plan to play “the long game” in defending U.S. critical infrastructure sectors from attacks.






[…]

1 2 3 15