You are here

Cybersecurity

Photo of the Week

Secretary Jeh Johnson enjoyed lunch in the mess at Secretary Jeh Johnson enjoyed lunch in the mess at @westpoint_usma, where he dined with current cadets and learned more about their training as the  next generation of our nation’s leaders. Secretary Johnson was on campus to deliver remarks at the Second Annual Joint Service Academy Cyber Security Summit.

Protect Your Data Against Ransomware

At DHS, we’ve recently observed an increase in ransomware attacks across the country. Ransomware is a type of malicious software, or malware, designed to block access to a computer system until a ransom is paid. Ransomware is typically spread through phishing emails or by unknowingly visiting an infected website.

Cyber Storm V: Testing the Nation’s Ability to Respond to Significant Cyber Incidents

Cyber threats to critical infrastructure remain one of our Nation’s most serious security and economic sustainability challenges. With over 80 percent of critical infrastructure owned by the private sector, and with millions of cyber-dependent equities owned by individuals or federal, state, local, tribal, and territorial (SLTT) entities and agencies, securing cyberspace must be achieved collaboratively. Exercises are critical to testing this coordination, and more importantly, to building and maintaining strong relationships among the cyber incident response community.

DHS Works with Critical Infrastructure Owners and Operators to Raise Awareness of Cyber Threats

The Department of Homeland Security (DHS) works closely with the Department of Energy (DOE) and the electric sector to ensure the security, resilience, and reliability of the U.S. power grid. Additionally, many American utility providers have invested heavily in both cyber and physical security. While the U.S. power grid is highly resilient, it’s important for owners and operators of electric and other critical infrastructure sector assets to be aware of this particular threat and to implement mitigation steps that will reduce their vulnerabilities to similar cyber-attacks and other malicious activity employing these tactics, techniques, and procedures. To be clear, this threat applies to any sector that uses industrial control systems, not just the electric sector.

Pages

Subscribe to Cybersecurity
Back to Top