Zero Trust Implementation Strategy
DHS has been implementing zero trust mandates for years. This strategy establishes a shared vision that better protects resources, stabilizes cybersecurity budgets, and accelerates mission outcomes.
An official website of the United States government
Here’s how you know
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
Secure .gov websites use HTTPS
A lock
()
or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.
DHS has been implementing zero trust mandates for years. This strategy establishes a shared vision that better protects resources, stabilizes cybersecurity budgets, and accelerates mission outcomes.
This infographic defines what doxing is and outlines proactive steps individuals can take to prevent themselves from doxing.
This product provides a declassified overview of findings from a classified joint report from the Attorney General and Secretary of Homeland Security addressing the impact of activities by foreign governments and their agents targeting election infrastructure or infrastructure pertaining to political organizations, candidates, or campaigns used in the 2022 US federal elections on the security or integrity of such infrastructure. Pursuant to Executive Order (EO) 13848, the joint report relied on the Intelligence Community Assessment (ICA) addressing foreign threats to the 2022 US elections.
The following are DHS S&T's CFTT reports for cloud data extraction tool (organized by publication date). The DHS Science and Technology Directorate funded these reports.
This foundational guide is the first in a series of guides that DHS hopes will help communities achieve their connected community goals.
At S&T, our goal is to be on the cutting-edge when it comes to ensuring our nation’s cybersecurity.
DHS SBIR Program is committed to identifying promising small businesses and innovative approaches to help address homeland security needs. This success story highlights the DHS SBIR company Centripetal., of Reston Virginia, which developed a disruptive solution to augment the CTI cycle with machine intelligence to improve efficiency and reduce operating costs of cybersecurity analysis.
DHS SBIR Program is committed to identifying promising small businesses and innovative approaches to help address homeland security needs. This success story highlights the DHS SBIR company SecureLogix., of San Antonio Texas, which developed Call Secure, a managed service that provides security protection to mitigate TDoS attacks by authenticating calls and helping to defeat fraudulent call spoofing, shifting the advantage from TDoS attackers to network administrators.
DHS recognizes that security researchers regularly contribute to the work of securing organizations and the Internet as a whole. Therefore, DHS invites reports of any vulnerabilities discovered on internet-accessible DHS information systems, applications, and websites.
DHS S&T announced seven awardees from the “Software Supply Chain Visibility Tools” topic call which sought innovative technologies to provide software bill of materials (SBOMs) based capabilities for stakeholders within the enterprise, system administrator, and software development communities.