Cybersecurity
Our daily life, economic vitality, and national security depend on a stable, safe, and resilient cyberspace.
-
Memorandum on Preparing for Post-Quantum Cryptography
This memorandum provides guidance to Component Heads to begin preparing for a transition from current cryptography standards to post-quantum encryption now to mitigate risks to data and mission functions.
-
Post-Quantum Cryptography Frequently Asked Questions
The Department of Homeland Security (DHS), in partnership with the Department of Commerce’s National Institute of Standards and Technology (NIST), has released a roadmap to help organizations protect their data and systems and to reduce risks related to the advancement of quantum computing technology.
-
Preparing for Post-Quantum Cryptography: Infographic
Through our partnership with NIST, DHS created a roadmap for those organizations who should be taking action now to prepare for a transition to post-quantum cryptography. This guide will help organizations create effective plans to ensure the continued security of their essential data against the post-quantum threat and prepare for the transition to the new post-quantum cryptography standard when published by NIST.
-
Key Findings and Recommendations: Foreign Interference Related to the 2020 US Federal Elections
This product provides a declassified overview of findings and recommendations from a classified joint report from the Attorney General and Secretary of Homeland Security addressing the impact of activities by foreign governments and their agents targeting election infrastructure or infrastructure pertaining to political organizations, candidates, or campaigns used in the 2020 US federal elections on the security or integrity of such infrastructure. Pursuant to Executive Order (EO) 13848, the joint report relied on the Intelligence Community Assessment (ICA) addressing foreign threats to the 2020 US elections.
-
Data Security Business Advisory
This Advisory describes the data-related risks American businesses face as a result of the actions of the People’s Republic of China (PRC) and outlines steps that businesses can take to mitigate these risks. Businesses expose themselves and their customers to heightened risk when they share sensitive data with firms located in the PRC, or use equipment and software developed by firms with an ownership nexus in the PRC, as well as with firms that have PRC citizens in key leadership and security-focused roles (together, “PRC firms”). Due to PRC legal regimes and known PRC data collection practices, this is particularly true for data service providers and data infrastructure.
-
DHS Targeted Violence and Terrorism Prevention and Protection FY2021 Budget Request Fact Sheet
The President’s Fiscal Year (FY) 2021 Budget Request strengthens the Department of Homeland Security's (DHS) prevention and protection missions.
-
Protecting and Preparing the Homeland Against Threats of Electromagnetic Pulse and Geomagnetic Disturbances
Extreme electromagnetic incidents caused by an intentional electromagnetic pulse (EMP) attack or a naturally occurring geomagnetic disturbance (GMD, also referred to as "space weather") could damage significant portions of the Nation's critical infrastructure, including the electrical grid, communications equipment, water and wastewater systems, and transportation modes.
-
NCSAM Resources
October is National Cybersecurity Awareness Month (NCSAM), a time to focus on how cybersecurity is a shared responsibility that affects all Americans. NCSAM is a collaborative effort between the U.S. Department of Homeland Security (DHS) and its public and private partners, including the National Cyber Security Alliance, to raise awareness about the importance of cybersecurity and individual cyber hygiene.
-
TSA Information Assurance Handbook
This handbook implements the policies and requirements of the Transportation Security Administration (TSA) Management Directive (MD) 1400.3, Information Technology Security by establishing guidance applicable to the use, development, and maintenance of TSA Information Technology (IT) assets, networks, and systems.
-
DHS National Cybersecurity Summit Fact Sheet
The DHS National Cybersecurity Summit represents public-private partnership in action. By convening dozens of CEOs and senior executives with U.S. Cabinet secretaries and senior government officials, along with hundreds of senior risk and security officers across a wide range of critical infrastructure sectors, this Summit conveys the imperative that the evolving and increasingly sophisticated and persistent cybersecurity threat landscape compels a collective approach to defending networks and managing national risk.