Department of Homeland Security News and Analysis | GovernmentCIO Media & Research

Department of Homeland Security News and Analysis

News and analysis covering technical modernization at the Department of Homeland Security. As an umbrella agency formed in the wake of the Sept. 11, 2001 attacks, DHS oversees responsibilities ranging from port security to travel screening and financial crimes investigation. This array of missions has encouraged the agency to adopt new technology that allows greater finesse and discretion.
Agency leadership is accelerating work on cloud adoption and remote information management to meet new challenges presented during the pandemic.
Identity-based approach to verification moves beyond perimeters and VPNs.
TSA and CBP pilot facial-recognition programs with an eye on security and privacy.
Several confirmed cases in DC area are prompting federal government to implement emergency working procedures.
Data management and skilling the workforce are part of a multi-pronged approach to AI.
A CTO, CDO and CISO plus a federal appointee are moving on to other opportunities.
The agency is aiming to advance and address the accuracy and privacy concerns of its biometrics system.
GSA's approach to managing passwords resembles shared services.
DHS leaders cite use cases in data management and resiliency.
The new assistant director brings artificial intelligence background to the agency.
Cybersecurity and emerging technologies were key in the agency's 2019 IT advancements.
An emphasis on cybersecurity boosts DHS from a D-minus to B FITARA score in half a year.
'Aptitude' is among government's top focus for potential recruits.
The federal shared service strategy will impact government in areas such as customer service and payroll.
Security leaders find value in tactics such as cyber escape rooms over traditional training.
Implementing continuous diagnostics and mitigation requires a holistic approach to integration.
Treating security like a business function encourages agency leads to get involved early on.
In the past year, agencies have cooperated on national security and security policy
Shared services provide cost savings, but are not always the answer.
Endpoint users will always be the weak link in cybersecurity. How do we mitigate the risk?