Guest blogger Suzanne Petrie Liscouski recaps one panel discussion from the AFCEA Homeland Security Conference on agile principles in procurement and goals, including successes with agile development and agile operations and maintenance.
Look out social media aficionados—the FBI could be watching your every post. Well, maybe not every one, and maybe not of everyone. But as social media has become a recruitment tool for terrorists, the popular public platforms have become a new hub for law enforcement as they ramp use of automation technology to scour for actionable intelligence.
The Department of Homeland Security Science and Technology Directorate has announced its first business accelerator program, EMERGE!, aimed at entrepreneurs who have innovative ideas that address the unique needs of the homeland security community and whose wearable technologies could be adapted for first responder operations.
Cybersecurity is one of the critical homeland security priorities, along with the threats posed in the varying domains of aviation, border security and maritime, said the deputy secretary of the Department of Homeland Security.
Knowing the cybersecurity threat might be half the battle toward mitigating problems, but the popular push and mounting trend toward increased information sharing, particularly between industry and the federal government, is not the be all and end all.
The U.S. House of Representatives on Tuesday ended its stalemate and voted to fully fund the Department of Homeland Security.
Secretary of Homeland Security Jeh Johnson voiced a hesitant optimism Thursday that U.S. Congress will come together to fully fund the department before tomorrow’s deadline that could shutter parts of the Department of Homeland Security.
In case you missed it, CBS’s newsmagazine "60 Minutes" this weekend featured a segment with Dan Kaufman, director of the Information Innovation Office (I2O) for DARPA, who talked about the office’s efforts to outsmart hackers, sex traffickers and those seeking to do harm to the United States.
The next big cyber attack likely will strike critical infrastructure assets in the United States, which could bring the world’s remaining superpower to its knees, according to cybersecurity experts. This would constitute a crippling assault against national assets such as power facilities, transportation networks, nuclear plants or the drinking water supply, these experts warn.
Jeh Johnson, secretary of the Homeland Security Department, is calling on Congress to pass a 2015 appropriations bill to fund additional security measures for border protection and homeland security.
The unmanned version of the K-MAX medium-lift helicopter, used in the war zone to ferry cargo, might find a new mission in the United States—fighting wildfires under the purview of the federal agency tasked with protecting the country’s natural resources.
The U.S. Coast Guard is engaged in a major overhaul of airborne reconnaissance capabilities, which will allow the service to shed aging platforms, add unmanned systems, enhance interoperability, improve efficiency and perform its missions more effectively.
Serial has become more than an ordinary podcast. Its captivating story line has listeners joining in the conversation, an approach that could help governments solve larger problems.
While terrorists can inflict individual points of damage to the U.S. homeland, cyberspace attacks hold the greatest potential for inflicting devastating damage that could change the nature of the nation.
The contractor that facilitates enrollment in the U.S. Transportation Security Administration’s PreCheck program developed an enrollment option to let employees of participating organizations sign up at their offices, saving them the trip to an airport or off-site enrollment center.
The U.S. Department of Commerce, Washington, D.C., today announced the consolidated screening list (CSL), a streamlined collection of nine different screening lists from the U.S. Departments of Commerce, State and the Treasury that contains names of individuals and companies with whom a U.S. company may not be allowed to do business due to U.S. export regulations, sanctions or other restrictions.
The National Institute of Standards and Technology (NIST) has published for public review draft recommendations to ensure the confidentiality of sensitive federal information residing on the computers of contractors and other nonfederal organizations working for the government.
NC State University researchers have developed technology that allows cyborg cockroaches, or biobots, to pick up sounds with small microphones and seek out the source. The technology is designed to help emergency personnel find and rescue survivors in the aftermath of a disaster.
You would think it would go without saying, but apparently not. So a U.S. Transportation Security Administration representative wrote a brief blog on a few Halloween travel tips if travelers are taking flight with costumes in tow.
Reginald Brothers, Department of Homeland Security (DHS) undersecretary for science and technology, today announced the new visionary goals for the department’s Science and Technology (S&T) Directorate.