Search Results for "" homeland security committee ""
Not finding what you’re looking for?
10 of 6350 Results
Homeland Security Conference 2013 Show Daily, Day 2
Review mirrors that of four years ago, though officials recognize a need for tweaks to address emerging threats to national security.
The U.S. top-down, federal government-based national security model currently used to protect the nation is not the best model for homeland security.
Reliable federal and state homeland security coordination hinges on information sharing, interoperability, governance and trust. But achieving the right mix of these elements among governments, law enforcement agencies and the private sector presents both cultural and technical challenges.
DHS secretary calls for appropriations bill to further beef up border protection.
Secretary Michael Chertoff outlines new challenges.
Next-gen mobile grows integral to homeland security.
Profound Internet growth and the changes it generates in the economy and society is a double-edged sword. Electronic commerce benefits are fundamentally altering the way people produce, consume and communicate. Yet, risks and vulnerabilities are inherent network byproducts. Growing electronic threats mandate risk management, customer confidence and at least some level of information protection.
The U.S. Department of Homeland Security became the 15th cabinet department in January 2003, consolidating 22 agencies and more than 180,000 people under one unified organization. Prior to creation of the department, no single federal department had homeland security as its primary objective. One can only imagine the challenges it faces as a brand new department in this age of technology. The department's staff is confronted every day with building the enterprise architecture, developing its geospatial capabilities, enhancing its cybersecurity and improving its wireless technologies.
The U.S. State Department is conducting "junkyard dog" network penetration tests and vulnerability assessments at U.S. embassies and consulates worldwide. Simultaneously, a network intrusion detection program will provide rapid warning of unauthorized access to the department's far-flung sensitive information systems.