Secretary Jeh Johnson said in a speech Feb. 7 that "when reform legislation is enacted, DHS must be prepared to implement reform. So to prepare for this potential outcome, I have already directed the deputy secretary of homeland security to coordinate the process, to ensure we are ready to implement the law." The speech, at the Wilson Center in Washington, D.C., was Johnson's first major policy address since his confirmation in December.
A software defect that caused a joint Veterans Affairs and Defense Department self-service benefits portal to display personally identifiable information to other users accessing the system affected no more than 1,362 individuals, a VA officials told a House panel.
Struggles with information technology are the most common management challenges across large agencies, an analysis from the consulting firm Grant Thornton shows. Numerous agencies faced challenges with both IT security and management.
The House Homeland Security Committee approved by unanimous voice vote a cybersecurity bill that would codify the Homeland Security Department's role in federal cybersecurity and require it to work with the private sector on securing critical infrastructure.
Basic cybersecurity measures such as patching, anti-virus software updates and password management are insufficient at federal agencies, leaving government networks vulnerable to even non-sophisticated cyber intrusions, finds a Feb. 4 report.
Nations should form an international agreement that forbids cyber attacks against civil nuclear facilities during peacetime, the EastWest Institute says in a new report.
Under a planned sole-source award, the FBI will buy 12 kits from Cellebrite USA, Inc., to obtain call histories, text messages, pictures, videos, passwords, location data and more – including deleted data – from Apple, Android, Blackberry and Microsoft devices.
In a report that forecasts cybersecurity trends for 2014, the company says that government cyber operations may increase in North African countries undergoing political turmoil and transitions – including Egypt, Libya and Tunisia – as regimes and their supporters seek to monitor dissidents and neighboring countries.
Using a new model that assesses cyber risks, costs and benefits over time, malicious actors can time attacks for the most damaging opportunities – and cyber defenses can be ramped-up in anticipation of a strike, says a new paper published in the Proceedings of the National Academy of Sciences.
A study by Microsoft based on data from its operating system-bundled anti-malware utility finds that the global prevalence of malware infections typically correlates as an inverse to countries' socioeconomic status, but that the relationship isn't necessarily linear.