You are here

Cyberattack

CISA Statement on Iranian Cybersecurity Threats

In response to reports of an increase in cybersecurity threats, the Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) Director Christopher C. Krebs issued the following statement:

“CISA is aware of a recent rise in malicious cyber activity directed at United States industries and government agencies by Iranian regime actors and proxies. We will continue to work with our intelligence community and cybersecurity partners to monitor Iranian cyber activity, share information, and take steps to keep America and our allies safe.

Snapshot: DHS, DOT Partner on Government Vehicle Telematics

When the managers of federal vehicle fleets were charged with implementing telematics systems for all their vehicles, the DHS S&T and the Department of Transportation’s Volpe National Transportation Systems Center (Volpe Center) teamed up to help.

Cyber Storm V: Testing the Nation’s Ability to Respond to Significant Cyber Incidents

Cyber threats to critical infrastructure remain one of our Nation’s most serious security and economic sustainability challenges. With over 80 percent of critical infrastructure owned by the private sector, and with millions of cyber-dependent equities owned by individuals or federal, state, local, tribal, and territorial (SLTT) entities and agencies, securing cyberspace must be achieved collaboratively. Exercises are critical to testing this coordination, and more importantly, to building and maintaining strong relationships among the cyber incident response community.

Statement by Secretary Jeh C. Johnson Regarding the DHS Einstein Program

I have read the GAO report “DHS Needs to Enhance Capabilities, Improve Planning, and Support Greater Adoption of its National Cybersecurity Protection System” dated January 28, 2016.  In this report, GAO asserts that DHS’s National Cybersecurity Protection System “is partially, but not fully, meeting its stated system objectives.” 

Subscribe to Cyberattack
Back to Top