The Common Weakness Enumeration project, co-sponsored by DHS, identifies the most common coding mistakes in a list of more than 800 weaknesses.
The Lone Star state is close to putting restrictions on how and when TSA agents can conduct pat-downs when travelers can't or won't pass through security scanners.
The hacker group releases hundreds of e-mails, intell bulletins, images and other files in what it says is a protest of the state's immigration laws.
The facial analysis technology that helps the CIA and TSA identify threats helps political analysts predict presidential campaigns.
Two new devices from the Homeland Security Department's Science and Technology Directorate will help track the movements and vital signs of firefighters responding to a blaze.
NOAA needs another satellite in orbit to continue providing accurate long-range forecasts, but Congress has pegged the satellite’s funding for cuts.
The Homeland Security Department has some advice for smart-phone users, and it sounds pretty familiar.
The Homeland Security Department, working with the private IT industry sector, has developed a set of practices to help mitigate the most serious risks to the Domain Name System.
Tools for monitoring the security status of IT systems are available, but a lack of standardization leaves administrators “drowning in noise,” government officials say.
Government IT security is improving but still not keeping up with the bad guys, according to a panel of government security officials.
Don’t plan on watching the first few minutes of a TV show or listening to a radio station at 2 p.m. Nov. 9.
Agencies are still at work gathering data needed to bring the latest GPS technology to bear in creating more accurate flood maps for the United States.
As industrial control systems that underlie the nation’s critical infrastructure become standardized and networked, securing them from attack has become a pressing issue. NIST offers a guide to protecting them.
The National Archives and Records Administration is creating a governmentwide policy for handling Controlled Unclassified Information that would replace the current patchwork of ad hoc agency-specific policies.
A new technology unveiled this week could let trusted travelers pass through a short scanning tunnel without shedding clothes and shoes.