DHS, Michigan team on cybersecurity

Michigan agrees to use a federally developed network flow monitoring system in first-of-a-kind agreement

The Homeland Security Department today said Michigan is deploying DHS’ Einstein 1 network flow monitoring system across the state's cyber networks in a first-of-a-kind DHS partnership with a state government.

Under the agreement, DHS’ U.S. Computer Emergency Readiness Team will identify possible abnormal activities on Michigan’s networks and deal with threats to critical computer infrastructure, the department said in announcing the partnership. DHS is in charge of protection the civilian .gov domain and interfaces with non-federal partners on cybersecurity efforts.

Federal agencies have used Einstein 1 for several years, and a more advanced version of the system, Einstein 2 – an intrusion detection system – is being deployed at civilian agencies. The DHS and Michigan partnership only uses Einstein 1, according to today’s announcement.

“This proof of concept will benefit Michigan’s cybersecurity interests by further enhancing its ability to identify and resolve a greater range of threats to its cyber infrastructure in coordination with a broad range of federal government entities,” said Michigan Gov. Jennifer Granholm, a Democrat. “It will enable greater federal and state coordination to promote mutual cybersecurity interests and, if successful, will inform the efforts of state governments to enhance their own cybersecurity efforts,” she added.

In the past, DHS has said it envisions deploying a third version of Einstein that would be an intrusion prevention system across civilian networks and systems. The department said the enhancement would give the government better situational awareness and that it has measures in place to ensure the protection of privacy and civil liberties. Meanwhile, such a plan to develop and use more advanced technology has raised privacy and civil liberties concerns.

About the Author

Ben Bain is a reporter for Federal Computer Week.

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

What is your e-mail address?

My e-mail address is:

Do you have a password?

Forgot your password? Click here
close
SEARCH
contracts DB

Trending

  • Dive into our Contract Award database

    In an exclusive for WT Insider members, we are collecting all of the contract awards we cover into a database that you can sort by contractor, agency, value and other parameters. You can also download it into a spreadsheet. Read More

  • Is SBA MIA on contractor fraud? Nick Wakeman

    Editor Nick Wakeman explores the puzzle of why SBA has been so silent on the latest contractor fraud scandal when it has been so quick to act in other cases. Read More

Webcasts

  • How Do You Support the Project Lifecycle?

    How do best-in-class project-based companies create and actively mature successful organizations? They find the right mix of people, processes and tools that enable them to effectively manage the project lifecycle. REGISTER for this webinar to hear how properly managing the cycle of capture, bid, accounting, execution, IPM and analysis will allow you to better manage your programs to stay on scope, schedule and budget. Learn More!

  • Sequestration, LPTA and the Top 100

    Join Washington Technology’s Editor-in-Chief Nick Wakeman as he analyzes the annual Top 100 list and reveals critical insights into how market trends have impacted its composition. You'll learn what movements of individual companies means and how the market overall is being impacted by the current budget environment, how the Top 100 rankings reflect the major trends in the market today and how the biggest companies in the market are adapting to today’s competitive environment. Learn More!