The Department of Homeland Security Office of Inspector General released on Jan. 30 the results of an audit it carried out concerning DHS’ use of artificial intelligence. Purpose of the Audit The
MoreKaren Evans, a former chief information officer at the Department of Homeland Security, has joined the Cybersecurity and Infrastructure Security Agency as senior cyber adviser. A CISA spokesperson confirmed Evans’ return to
MoreRep. Dale Strong, R-Ala., has introduced a bill that would direct the Department of Homeland Security’s Science and Technology Directorate, or S&T, to develop a process to protect sensitive information in research
MoreRobert Hammer announced on LinkedIn Thursday that he has been appointed deputy executive associate director and acting executive associate director of homeland security investigations at the Department of Homeland Security. Robert Hammer’s New
MoreThe U.S. Senate has confirmed Kristi Noem as secretary of the Department of Homeland Security on a 59-34 vote. Senators worked over the weekend to confirm Noem as the eighth homeland security
MoreThe Cybersecurity and Infrastructure Security Agency and the FBI have unveiled an advisory regarding vulnerabilities in the Ivanti Cloud Service Applications, or CSAs. Responding to Critical Ivanti CSA Threats CISA said Wednesday the
MoreFully operational face recognition and face capture, or FR/FC, technologies such as traveler ID checks at various U.S. ports of entry worked over 99 percent on average, according to a recently released
MoreThe National Security Agency, in partnership with other federal agencies, has released a cybersecurity information sheet, or CSI, outlining recommended actions to address software understanding gaps. The CSI was finalized in coordination
MoreThe Department of Homeland Security has released a report exploring the technologies used to develop and propagate digital content forgeries and how foreign governments and nongovernmental organizations can use such technologies to
MoreThe boards and other leaders of private sector companies could foster a culture of cybersecurity within their respective organizations by ensuring that chief information security officers possess sufficient influence and resources to
More