Secretary of Homeland Security John Kelly told the Senate Committee on Homeland Security and Government Affairs that the border wall the president promised will probably be an amalgam of physical barriers and technological sensors, including drones and radar. He said that DHS will set up physical barriers at the points where border security chiefs deem walls most necessary. […]

The Department of Homeland Security offers cybersecurity services to states and other Federal agencies. However, the agency’s cyber systems are not exercising their full potential, the Government Accountability Office found. […]

The Department of Homeland Security’s compliance-based approach will shift to an individualized assessment of components’ threat posture, according to Danny Toler, acting assistant secretary for DHS’s Office of Cybersecurity and Communications. Instead of relying on a “three-ring binder” approach, which standardizes cybersecurity requirements throughout an agency, Toler said DHS will appraise its entities’ cyber stances […]

Last summer, DHS passed a rule requiring incoming port personnel to scan their identification cards through an electronic reader. The agency then approved idSoftware’ s SecureGate Ports technology, which uses biometrics to ensure a person is authorized to enter a port. idSoftware, based in Greenville, S.C., specializes in security technology. […]

Weekend Reader

Developing a biometric entry-exit system to track foreign visitors to the U.S. and ensure they don’t overstay their welcome was a key recommendation of the final report of the 9/11 Commission after it was determined that five of the nine hijackers had overstayed their visas. Nearly 13 years and several missed deadlines later, the goal of achieving that fully integrated system remains elusive for the Department of Homeland Security, according to a new report by the Government Accountability Office. […]

Federal Joint Analysis Reports should include stronger language on indicators of compromise, according to Cris Thomas, a network security strategist at Tenable. DHS and the FBI released a JAR on Dec. 29 that discusses the tools Russian intelligence officers used to compromise the networks and infrastructure associated with the recent U.S. presidential election. […]

Centrify and SailPoint Technologies have tools to address the tasks outlined in Phase 2 of the Department of Homeland Security’s Continuous Diagnostics and Mitigation program, according to representatives from the companies and DHS itself. […]

Retired Marine Gen. John Kelly stressed the importance of working together to combat cyber warriors at his confirmation hearing for Secretary of Homeland Security. Kelly said that incumbent Secretary of Defense Ash Carter was “on to something” when he reached out to Silicon Valley companies for best cybersecurity practices. […]

ZeroPoint Dynamics, a start-up company specializing in technology that can detect exploit payloads in email and Web content, will be commercialized through the Department of Homeland Security Cyber Security Division’s Transition to Practice program. […]

Some North Atlantic Treaty Organization member countries will adopt the Next-Generation Incident Command System, the Department of Homeland Security Science and Technology Directorate announced. […]

MeriTalk compiles a weekly roundup of contracts and other industry activity. Here’s what happened this week in the Federal Information Technology community. […]

The Department of Homeland Security identified Mirai as one type of malware used in a recent cyberattack that brought down major websites, according to a statement from DHS Secretary Jeh Johnson. […]

Thirty-three states have sought out the Department of Homeland Security (DHS) for cybersecurity services, according to Andy Ozment, Assistant Secretary for Cybersecurity and Communications at DHS. […]

Categories