China Claims to Have Created Hack-Proof Quantum Internet
Quantum key distribution means an encrypted message and its keys are sent separately, and any attempt at tampering will cause the message to self-destruct. Keep Reading
Quantum key distribution means an encrypted message and its keys are sent separately, and any attempt at tampering will cause the message to self-destruct. Keep Reading
In a White House statement, the Trump Administration announced that Suzette Kent to be Administrator of the Office of Electronic Government, Office of Management and Budget. Ms. Kent is an industry leader of large-scale business transformation using technology, for the world’s most complex organizations. She is currently a principal at EY and has been a… Keep Reading
Under the Immigration and Nationality Act, a noncitizen who is likely to become a public charge is generally inadmissible to
The United States, in concert with the United Kingdom, is imposing additional costs on the Russian Federation on the one-year
If you don't recognize Franklin by his name, you will, most likely, recognize two of his high-profile victims: Hustler magazine
DHS industry watchers were concerned when, on a recent agenda for Reverse Industry Day, Nina Ferraro was identified as acting chief procurement officer for the department. HSToday has found out that Ferraro is temporarily in the spot while Soraya Correa takes care of some family business and will be back shortly. HSToday has also learned… Keep Reading
The Department of Justice has demanded that 23 jurisdictions in the U.S. provide documents that would show whether they are withholding information on illegal immigrants from the department. Federal statute 8 U.S.C. 1373 promotes information sharing related to immigration enforcement and with which compliance is a condition of FY2016 and FY2017 Byrne JAG awards.. “I… Keep Reading
President Trump’s commitment to building a wall along the U.S.-Mexican border continues to polarize both Congress and bilateral ties with our southern neighbor. While Democrats argue walls don’t work and even many Republicans question the $21.6 billion price tag, both concerns are overwrought. While critics say there is no utility in a border wall, countries… Keep Reading
Timing is everything. Three days — including a weekend — is not quite enough to cause production problems that really hurt. Just days into the U.S. government shutdown in 2013, several defense companies threatened to furlough thousands of their employees whose jobs were tied to federal facilities or projects that were curtailed. This year, that… Keep Reading
Under the Immigration and Nationality Act, a noncitizen who is likely to become a public charge is generally inadmissible to
The United States, in concert with the United Kingdom, is imposing additional costs on the Russian Federation on the one-year
If you don't recognize Franklin by his name, you will, most likely, recognize two of his high-profile victims: Hustler magazine
A partial government shutdown is entering its third day on Monday after lawmakers were unable to reach a deal on a short-term funding bill. The House passed a month-long continuing resolution to fund the government, but Senate Democrats opposed the measure, holding out for a fix to protect so-called Dreamers, young immigrants brought to the country… Keep Reading
Going through airport security is a universally painful experience. And despite being slow and invasive, the TSA doesn’t have a great record at catching threats. With the help of the Kaggle data science community, the Department of Homeland Security (DHS) is hosting an online competition to build machine learning-powered tools that can augment agents, ideally… Keep Reading
House lawmakers have passed legislation that will require DHS to tell Congress how known cyber vulnerabilities are being disclosed to the private sector. The bill directs DHS to submit a report to Congress that contains “a description of the policies and procedures developed for coordinating cyber vulnerability disclosures.” It also asks for an annex outlining… Keep Reading
The National Association of State Chief Information Officers has released its 2018 federal advocacy priorities, and high on the list is clarifying conflicting security regulations from different agendas and programs. Other top priorities include recognizing state authority and ongoing innovation with emerging technology, and meeting citizens’ expectations through sharing information. “State CIOs continue to seek… Keep Reading
The House passed a bill restoring and expanding a top cyber diplomacy office that Secretary of State Rex Tillerson shuttered in August, marking a rare break on cybersecurity between the Trump administration and congressional Republicans. The cyber coordinator’s office, which launched in 2011, inspired imitators in more than 20 foreign ministries worldwide. Under veteran White… Keep Reading
The Department of Homeland Security is providing tools and resources to private companies to engage in “active defense” against cyber threats, its secretary said, a practice that has drawn scrutiny from some legal and cybersecurity experts. Homeland Security Secretary Kirstjen Nielsen told a Senate panel that “active defense” is part of the department’s engagement with… Keep Reading
The Department of Homeland Security (DHS) Science and Technology Directorate (S&T) has awarded a $750,000 contract to El Segundo, Calif.-based InferLink Corporation to develop an advanced search functionality for the Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) cybersecurity research portal. The award was made through the Small Business Innovation Research Other… Keep Reading
Department of Homeland Security press release The Department of Justice (DOJ) and the Department of Homeland Security (DHS) released a report revealing that three out of every four, or 402, individuals convicted of international terrorism-related charges in U.S. federal courts between September 11, 2001, and December 31, 2016 were foreign-born. Over the same period, U.S.… Keep Reading
To start the new year, U.S. Coast Guard Commandant Adm. Paul Zukunft shared his bookshelf and his leadership philosophy with Coasties on his All Hands blog. The commandant said in a “volatile, increasingly complex and uncertain time” the USCG should focus on the importance of sound leadership to move forward. The commandant’s leadership philosophy is… Keep Reading
While mega-breaches of high-profile private companies provide headline fodder, the federal government has its own share of vulnerabilities in cyberspace. In fiscal year 2016, government agencies reported 30,899 information-security incidents, 16 of which met the threshold of being a major incident. This list is neither exhaustive nor does it include breaches to state and local… Keep Reading
The Government Technology & Services Coalition (GTSC), December 13, honored a tremendous line-up of heroes at the organization’s packed Holiday Awards. “GTSC has had a tremendous year and has expanded its service to the homeland security community through the great work of our members and government partners,” said Kristina Tanasichuk, founder and CEO of the Coalition. … Keep Reading
The DHS OIG has found that the Office of Health Affairs (OHA), DHS does not have a proper framework for protecting Personally Identifiable Information (PII). The OIG reviewed the Office’s current privacy safeguards for protecting the multitude of personally identifiable information (PII) that it collects and maintains. While OHA did have a Privacy Officer in… Keep Reading