Customs and Border Protection will collect fingerprints and passport information and compare it to the same data that was collected when the traveler arrived in the United States.
Data loss prevention solutions monitor the network for leaks from endpoint devices such as USBs, printers and mobile devices.
The Network Mapping System is the third technology that has successfully gone through DHS’s Transition to Practice program and into the commercial market.
Lessons from a digital-government pioneer on how to think about providing better citizen service.
An effective cybersecurity plan must not just address the problems outlined in the 30-day cybersecurity sprint, but also the underlying issues that have kept agencies from fully complying with existing security programs.
While agencies acknowledge the risks and expense of continuing to run Windows XP, killing off the entrenched operating system is taking longer than anticipated.
The New Jersey Cybersecurity and Communications Integration Cell hopes to detect attacks aimed at banking institutions with the help of shared threat intelligence.
States increasingly are employing facial recognition software to compare driver’s license or ID photos with other images on file.
Vencore Labs’ SecureSMART solution helps utilities detect early signs of attacks on wireless networks and validate security controls in the electric grid.
The Office of Personnel Management warned that anyone who has submitted to a background check since 2000 is likely at risk — as are some of the family and associates listed on their applications.
The key to enhancing mobile security is combining a secure digital identity with a second authentication factor such as a PIN or fingerprint to let employees use their devices to authenticate themselves for physical and digital access.
Louisiana Tech and the University of San Diego have launched programs to support public-private cybersecurity research and build a cyber-savvy workforce.
The U.S. Computer Emergency Readiness Team collaborates with other federal agencies and industry to quickly disseminate cyber threat alerts.
NIST has proposed two new building blocks to improve email security and to provide security services based on personal identity verification (PIV) credentials through mobile devices.