Three Chances to Connect with S&T in March
March brings three opportunities for innovators, partners and stakeholders to connect with DHS S&T.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock
()
or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
March brings three opportunities for innovators, partners and stakeholders to connect with DHS S&T.
The following are CFTT reports for string search tools (organized by publication date).
DHS S&T is working to increase mobile app security by developing innovative solutions that will extend beyond deployment of an app to provide continuous security assurance throughout an app’s lifecycle.
DHS S&T awarded a total of $5,643,466 across seven organizations to develop new tools to arm researchers with the latest insight and an increased collection of cybersecurity incident data to understand and counter cyber attacks.
DHS S&T has awarded a $750,000 contract to El Segundo, California-based InferLink Corporation to develop an advanced search functionality for the Information Marketplace for Policy and Analysis of Cyber-risk & Trust (IMPACT) cybersecurity research portal.
What a year! Starting October 2016 through this past September, the DHS Science and Technology Directorate’s (S&T) Transition to Practice (TTP) program commercialized, spun off or released as open source 10 new cybersecurity technologies.
DHS S&T has awarded 418 Intelligence Corporation of Herndon, Virginia $350,000 to develop a forecasting platform that will help critical infrastructure owners and system operators share and keep abreast of the latest developments in cybersecurity protection.
The public voice network has become the target of many attacks, including Telephony Denial of Service (TDoS), robocalls (automated telephone calls), SWATing (anonymously filing police reports to provoke a police raid) and bomb threats. TDoS is a flood of malicious inbound calls that target public-safety response systems such as 911. The Department of Homeland Security, Science and Technology Directorate (S&T) Distributed Denial of Service Defense (DDoSD) is working to shift the advantage from a DDoS attacker to the network administrator by developing the capability to authenticate callers and detect fraudulent call spoofing.
Mandated by the Cybersecurity Act of 2015, the “Study on Mobile Device Security” relied on significant input from mobile industry vendors, carriers, service providers and academic researchers.
Distributed Denial of Service (DDoS) attacks are used to render key resources unavailable. Hackers accomplish a DDoS attack by literally sending so much web traffic at a target that it is unable to function. A classic DDoS attack disrupts a financial institution’s website and temporarily blocks the ability of consumers to conduct online banking. A more strategic attack makes a key resource inaccessible during a critical period. The Department of Homeland Security Science and Technology Directorate (S&T) Distributed Denial of Service Defense (DDoSD) is working to increase deployment of best practices that would slow attack scale growth, seeking to defend networks against one terabit per second (Tbps) scale attacks through development of collaboration tools suitable for medium-scale organizations and working to defend emergency management systems—both current 911 and Next Generation 911 systems—from Telephony Denial of Service (TDoS) attacks.