The risk-based approach of the Continuous Diagnostics and Mitigation program shifts cybersecurity from solely a technical issue to an everyday business priority.
Technically, state and local governments can buy tools and services from the Department of Homeland Security’s Continuous Diagnostics and Mitigation program, but few have jumped on board.
National Telecommunications and Information Administration’s working groups made initial presentations on securing the internet of things.
Browser histories, telephone contacts and social media use may help DHS supplement the sometimes spotty or even non-existent data on travelers available from their home countries.
Contextual access-control solutions grant access to resources according to context-based security policies.
Using intelligent deception, IT security teams can not only deflect attacks, but they can also detect what invaders are looking for and ultimately identify the cyber criminals and stop the attack.
Cyber professionals must help decision makers understand the nature, impact and context of vulnerabilities so they understand the available courses of action, their relative costs, impacts and benefits.
The intelligence community's research arm is working on detecting fake fingerprints and developing devices to collect fingerprint data without a human operator.
Working with Carnegie Mellon University, the Army Reserve has developed the Cyber Warrior Database, a master repository to track the skills soldiers acquire in their civilian jobs and match them to potential military applications.
The independent federal commission that helps states improve their voting systems wants more clarity on what DHS' critical infrastructure designation means.
Beyond ensuring overall network security, government cybersecurity specialists have several ways of locking down a smartphone.
Officials in Livingston County, Mich., turned to a machine learning tool that can find anomalies in user and device behaviors without previous knowledge of what to look for.