Official website of the Department of Homeland Security
Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace.
This project guide introduces you to the distinct goals and objectives for the complementary SRMNI and Emergency Communications projects and provides an overview of the ongoing R&D of new and cutting-edge solutions. These solutions will help secure legacy and next-generation mobile network infrastructure and help protect the critical communications systems used by the nation’s first responders.
EBook for Virtual R&D Showcase Series 1: Enhancing Public Health Security and Resilience
This product provides a declassified overview of findings and recommendations from a classified joint report from the Attorney General and Secretary of Homeland Security addressing the impact of activities by foreign governments and their agents targeting election infrastructure or infrastructure pertaining to political organizations, candidates, or campaigns used in the 2020 US federal elections on the security or integrity of such infrastructure. Pursuant to Executive Order (EO) 13848, the joint report relied on the Intelligence Community Assessment (ICA) addressing foreign threats to the 2020 US elections.
In accordance with Section 101 and Title I of the SECURE Technology Act (P.L. 115-390), this policy provides security researchers with clear guidelines for (1) conducting vulnerability and attack vector discovery activities directed at Department of Homeland Security (DHS) systems and (2) submitting those discovered vulnerabilities. This policy has been developed in consultation with the Attorney General, the Secretary of Defense, the Administrator of GSA, and non-governmental security researchers.
This Advisory describes the data-related risks American businesses face as a result of the actions of the People’s Republic of China (PRC) and outlines steps that businesses can take to mitigate these risks. Businesses expose themselves and their customers to heightened risk when they share sensitive data with firms located in the PRC, or use equipment and software developed by firms with an ownership nexus in the PRC, as well as with firms that have PRC citizens in key leadership and security-focused roles (together, “PRC firms”). Due to PRC legal regimes and known PRC data collection practices, this is particularly true for data service providers and data infrastructure.
The CAP fact sheet provides program overview and impacts.
The President’s Fiscal Year (FY) 2021 Budget Request strengthens the Department of Homeland Security's (DHS) prevention and protection missions.
The following are CFTT reports for write-protected drives (organized by publication date). The DHS Science and Technology Directorate funded these reports.
This S&T study recommends federal agencies adopt a continuous approach to standards-based mobile app vetting by integrating vetting tools with EMM and exploring nontraditional approaches, such as app threat intelligence. These approaches would improve overall federal system mobile device and enterprise security while also enabling employees to use apps to conduct business and accomplish their organization’s mission.
FPDI defends the safety and security of the food system by conducting research to protect against vulnerabilities in the food supply chain, from farm to table, and to reduce the potential catastrophic attacks on public health and the economy.