Department of Homeland Security (DHS)

See the following -

A Deeper Look at the Financial Impact of Cyber Attacks

Emily Mossburg | Financial Executives International Daily | December 15, 2015

As large-scale instances of data theft — including theft of credit card records and personally identifiable information (PII) — are becoming more frequent, corporate executives and financial leaders are giving greater attention to the “cost” of cyber breaches. Are they looking at the breach, which typically categorizes data theft, or are they addressing “cost” as it relates to the entirety of the impact of a cyber incident to the enterprise?

Read More »

After Stuxnet: The New Rules Of Cyberwar

Robert L. Mitchell | Computerworld | November 5, 2012

Critical infrastructure providers face off against a rising tide of increasingly sophisticated and potentially destructive attacks emanating from hacktivists, spies and militarized malware. Read More »

As Open Source Goes Mainstream, Institutions Collaborate Differently

Alex Howard | TechRepublic | November 14, 2014

18F has quietly become the bleeding edge of the US federal government's adoption of open source software. Read about the benefits and challenges of open source going mainstream...

Read More »

Auditor Finds $300 Million In Duplicative IT Systems At 3 Agencies

Joseph Marks | Nextgov | September 12, 2013

A dozen duplicative information technology systems at three federal agencies have cost the government more than $300 million during the past five years, an auditor announced Thursday. Read More »

Auditors Fault Pentagon Sorting of Biggest Bioweapon Threats

Diane Barnes | Nextgov.com | May 19, 2014

Auditors say the Defense Department is not following its own procedures for guarding against "potentially catastrophic" biological strikes...

Read More »

Call For Participation: State And Local Government Study On Open Source Adoption

Deborah Bryant | Bryant Group | October 17, 2013

If you’re a U.S. State or Local technology professional with experience in open source software for your organization, your participation is being sought for a national study. Read More »

Cantaloupe vs. al-Qaeda: What's More Dangerous?

Michael Meurer | Truthout | September 15, 2013

[An important revelation] is the exposure of a nearly lunatic disproportion in threat assessment and spending by the US government. This disproportion has been spawned by a fear-based politics of terror that mandates unlimited money and media attention for even the most tendentious terrorism threats, while lethal domestic risks such as contaminated food from our industrialized agribusiness system are all but ignored Read More »

CDC Official Protests Federal Medical Response Cuts

Diane Barnes | Nextgov.com | April 29, 2014

More than half a decade of reductions to spending on state and local public-health agencies has already been "extremely damaging" to capabilities across the country for responding to unconventional attacks and other disasters, Dr. Ali Khan, director of the Public Health Preparedness and Response Office at the Centers for Disease Control and Prevention, told Global Security Newswire in an interview. 

Read More »

CISPA Is Back: FAQ On What It Is And Why It's Still Dangerous

Mark M. Jaycox and Kurt Opsahl | Electronic Frontier Foundation | February 25, 2013

The privacy-invasive bill known as CISPA—the so-called “cybersecurity” bill—was reintroduced in February 2013. Just like last year, the bill has stirred a tremendous amount of grassroots activism because it carves a loophole in all known privacy laws and grants legal immunity for companies to share your private information. Read More »

Citing Anthrax And Smallpox Scares, White House Tells Federal Labs To Take Stock

Rebecca Carroll | Nextgov.com | August 28, 2014

After recent mishandling of potentially deadly pathogens, the White House is urging all federal laboratories to conduct what it is calling a “safety stand-down,” security and science officials announced Thursday.  Agencies that handle infectious agents or toxins have been asked to complete overviews of their programs within 30 days of a memo dated Aug. 18...

Read More »

Cybersecurity Effort Launched To Strengthen Software Infrastructure

Press Release | Morgridge Institute for Research | November 1, 2012

Scientists at the Morgridge Institute for Research, Indiana University, the University of Illinois at Urbana-Champaign and the University of Wisconsin–Madison have received a $23.6 million grant..to address threats arising from the development process of software used in technology ranging from the national power grid to medical devices. Read More »

Developer Of Sensitive Devices To Detect Diseases, Proteins Gets In-Q-Tel Funding

Dawn Lim | Nextgov | November 15, 2012

Biotech firm Quanterix raised $18.5 million in a funding round joined by CIA venture capital wing In-Q-Tel, the company announced. Read More »

DHS Agrees To Outside Study On Cancer Risks Of Airport Body Scanners

Aliya Sternstein | Nextgov | December 14, 2012

The Transportation Security Administration has tapped the National Academy of Sciences to probe the health risks of body scans to passengers and pilots after years of pressure from civil liberties groups and Congress. The study is limited to radiation and safety testing, and will not examine the privacy implications of the X-ray machines, according to a new contracting notice. Read More »

DHS Releases Career Guidance For IT Professionals

Brittany Ballenstedt | Nextgov | February 12, 2013

Many experts have long concluded that the federal government lacks a clear career path for federal IT professionals, making it difficult for government to effectively compete for and retain these professionals. But the Homeland Security Department is hoping to change that... Read More »

DHS Tries Monitoring Social Media For Signs Of Biological Attacks

Aliya Sternstein | Nextgov | November 9, 2012

The Homeland Security Department has commissioned Accenture to test technology that mines open social networks for indications of pandemics, according to the vendor. Read More »