Emerging Tech

Bill Would ‘Jumpstart’ Planning Process for Beefing up Border Security Tech

The bill, announced by Rep. Elissa Slotkin, would require the Homeland Security Department to develop a comprehensive border security technology strategy.

Ideas

Diving into Government’s Trusted Internet Connections Standard 3.0 

The policy lays out the framework for security, but allows agencies to fill in the details based on their unique missions.

Cybersecurity

COVID Could Spur Reduced Reliance on Classified Sources of Cyber Intelligence

CISA officials highlighted cloud configuration and VPN vulnerabilities in assessing threats associated with the pandemic.

Digital Government

DHS Files Rule Proposing Increasing Scope of Biometric Information Collection 

The Homeland Security Department posted the full text of a proposal to the Federal Register that would give it the ability to collect more biometric information from immigrants.

Digital Government

DHS, USCIS Want to Collect More Biometric Information from Immigrants

The Homeland Security Department will propose a rule change that would allow U.S. Citizenship and Immigration Services  to collect voice, iris and facial recognition scans. 

Digital Government

Customs Deploying Biometric Tech at Ports Without Fully Addressing Privacy Requirements, GAO Finds

A new audit shows Customs and Border Protection isn’t providing enough transparency to travelers regarding facial recognition technology at ports.

Cybersecurity

OMB Starts Clock on Agencies Implementing Policies to Welcome Public Security Research

CISA also released a binding operational directive and will start scanning government systems for the policies when time is up in six months.

Ideas

What Agencies Need to Know About TIC 3.0 and Enabling Technology

The third version of the Trusted Internet Connection policy brings government IT closer to the capabilities available to the private sector. 

Cybersecurity

CISA, International Counterparts Highlight Mistakes Organizations Make After a Cyber Intrusion

A lot of what’s necessary to appropriately respond to a cyber incident should happen way in advance.

Digital Government

DHS Shares People’s Personal Information with 11 Government Programs, Saving Taxpayers Millions

The agency released its annual report on automated data sharing, touting the economic benefits by reducing costs and erroneous and duplicative payments.

Cybersecurity

Cyber Defenders

In this ebook, Nextgov talks to top cyber-focused officials about the programs that aim to secure federal information and networks.

Cybersecurity

Federal Agencies Warn North Korean Hackers Have Upgraded Their Cash-Out Schemes

A joint alert shared details of tactics and malware used by a state subgroup the U.S. government calls the BeagleBoyz.

Podcasts

Critical Update: Why a Government Vulnerability Disclosure Program Is a Big Deal

The new policy could change the government’s relationship with hackers but some agencies have reservations.  

Cybersecurity

CISA Warns of Vulnerabilities in Popular Domain Name System Software 

Security advisories note attackers could remotely exploit flaws to cause a denial of service.

Digital Government

IG Finds Legacy System to Blame for Delayed DHS Data Reporting

The system the Federal Emergency Management Agency uses to track a flood insurance program lacks automation, slowing DATA Act-required reporting down.

Cybersecurity

The President’s Cup Cybersecurity Competition Is Underway

The competition is open to any federal employee, including the Department of Defense and uniformed service members.

Modernization

7 of 10 Agencies Respond to Senator’s Request for IT Modernization Plans

Sen. Maggie Hassan asked for updates on the government’s 10 legacy systems previously flagged as most in need of an update.

Emerging Tech

Homeland Security Testing Lab Wants to Hear About the Best Temperature Screening Tools in the Market

The tools will be assessed and included on a list of recommended products for federal and local emergency responders and law enforcement.

Policy

CBP Shifts to Enterprise Approach to Manage Phone Searches at U.S. Borders

The agency uses metadata to create a system of record for electronic device searches but agents may be able to access information irrelevant to their cases.