Preparing for the Unlikely
Resources from S&T’s National Urban Security Technology Laboratory can help state, local, tribal, and territorial jurisdictions plan for and recover from radiological or nuclear incidents.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock
()
or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
Resources from S&T’s National Urban Security Technology Laboratory can help state, local, tribal, and territorial jurisdictions plan for and recover from radiological or nuclear incidents.
Software Supply Chain Visibility Tools
DHS S&T announced seven awardees from the “Software Supply Chain Visibility Tools” topic call which sought innovative technologies to provide software bill of materials (SBOMs) based capabilities for stakeholders within the enterprise, system administrator, and software development communities.
S&T is continuously working to equip those within DHS dedicated to securing soft targets with enhanced detection methods.
DHS S&T announced a new solicitation in partnership with CISA that address weaknesses in software, a key component of critical infrastructure systems.
This success story highlights the DHS SBIR company Applied Visions of Northport, New York, which developed Code Ray, a software assurance risk management technology that improves the speed, accuracy and confidence in detection of vulnerabilities and source code weaknesses.
DHS S&T collaborates with Intelligent Automation, Inc., to develop system that protects operating systems and apps on embedded platforms against cyberattacks.
Funding awarded to Kynamics of Mountain View, CA, to build a portable system for language translation capabilities to support United States Coast Guard missions.
Read the latest results and feedback on the usability of NERFHERDER for first responders.
The Common Weakness Enumeration (CWE) list of the 25 most dangerous software errors is a compilation of the most frequent and critical errors that can lead to serious vulnerabilities in software.