Department of Homeland Security News and Analysis
News and analysis covering technical modernization at the Department of Homeland Security. As an umbrella agency formed in the wake of the Sept. 11, 2001 attacks, DHS oversees responsibilities ranging from port security to travel screening and financial crimes investigation. This array of missions has encouraged the agency to adopt new technology that allows greater finesse and discretion.
Michele Thomas discusses her career in government and what’s ahead in cybersecurity innovation for homeland security.
Cybersecurity, AI and health IT are major focuses in this year's budget proposal.
Good cyber defense comes down to consistent communication and information-sharing.
Leaders are focused on changing mindsets instead of buying specific tools for zero trust.
Many federal agencies are tackling identity, credential and access management solutions to help them in their new zero trust approach to security.
Modernizing systems for more mobile environments can ensure efficient applications of AI and biometrics in tandem to pinpoint enemies.
CISA encourages federal agencies to adopt a zero trust approach to cybersecurity to prevent cyberattacks.
DOD overcomes fear of innovation in the digital space and starts to embrace emerging technologies and tools in AI and DevSecOps.
CISA Director Jen Easterly encouraged critical infrastructure organizations and federal agencies to aggressively shore up cyber defenses as Russia bombards Ukrainian critical infrastructure with malware.
The Army, Air Force and Navy's modern application practices are improving security postures.
An ICE call center is streamlining surges in case volumes received during the COVID-19 pandemic.
Establishing security requirements at the beginning of the software development life cycle is key.
Federal cyber leaders clamor for cyber incident reporting legislation amid zero trust implementation.
Use cases for the technology are enabling full national security protections across government.
The federal community has gleaned similar benefits from automated functions.
Software supply chain risk management and continuous monitoring are key strategies for maintaining a strong cyber posture in the cloud.
The cloud capability does more than improve lag time — it also has the potential to transform federal IT.
From buzzword to White House imperative, zero trust can be a confusing but necessary concept for security strategies.
Federal agencies can start by applying a zero trust security model to cloud operations.