New measures would provide more cybersecurity funds
The House and Senate Appropriations committees have approved different measures to fund DHS in fiscal 2009, and each would provide more money for cybersecurity than the Bush administration requested.
DHS measures move through House subcommittee
A subcommittee of the House Homeland Security Committee approved a series of measures yesterday meant to provide more access to DHS' information and intelligence products.
Bush: Companies required to confirm employee legal work status
The Bush administration is requiring that all federal contractors use an electronic verification system to ensure that employees are eligible to work in the U.S.
DHS issues RFI for financial system consolidation
DHS has restarted the procurement process for its planned financial management system consolidation.
CBP needs to improve trusted shipper security
To ensure the security of its trusted shipper program, Customs and Border Protection should improve the technology it uses, according to a report by government auditors.
IBM suspension prohibits new orders from agencies
A government document obtained confirms that the EPA's March 27 suspension of IBM from government work stops agencies' actions to purchase from the company.
Feds issue disaster plan blueprint
The Bush administration has revised its blueprint for dealing with natural and man-made disasters, with a focus on gaps identified by state and local emergency managers and other stakeholders.
Legislators: DHS doing a poor job with data sharing
DHS is at risk for losing support for funding because it is not doing a good enough job of sharing information with state, local and federal homeland security officials.
Contractor employees implicated in passport breach
<font color="CC0000"><b>UPDATED</b></font color>?Stanley Inc. and Analysis Corp. were named as the contractors involved in the improper accessing of the passport file of presidential candidate Barack Obama.
Info-sharing czar touts U.S. progress
But Thomas McNamara says cultural and administrative challenges still impede getting government to better share homeland security, law enforcement and intelligence data.
DHS' Cyber Storm II kicks off
Players in Cyber Storm II include nine states, four foreign governments, 18 agencies and 40 private companies that work in IT, telecom, chemicals and pipe and rail transportation infrastructure.
Auditors: Lack of Project 28 testing added to delays
DHS will hire Johns Hopkins University's Applied Physics Laboratory to test the next-gen technology system that DHS plans to deploy to secure the U.S.-Mexico border.
A tale of two borders
The U.S. strategy for securing its border with Canada primarily will use technology, while DHS' strategy for securing the southern border also includes hundreds of miles of fencing.
DHS puts brake on border fence
The department has extended the time frame for the first phase of SBInet by three years.
Unisys snags TSA CISO
Patricia Titus will leave TSA to take a job at Unisys after more than five years at the agency.
DHS may accept Project 28
DHS Secretary' said in the next few days the agency will "likely accept" the first task order of its multibillion-dollar project to use technology and tactical infrastructure to secure the U.S.-Mexico border.
Skinner: DHS disaster recovery ability lacking
DHS' ability to adequately recover its information systems in the wake of a disaster is a "major concern," the department's inspector general said yesterday.
Lockheed wins FBI biometric contract
Lockheed Martin Corp. is expected to be named the winner today of the FBI's new $1 billion biometric database contract, according to industry sources.
Portal consolidation to improve DHS' info sharing
The new Web environment will replace the existing SBU Homeland Security Information Network platform, which many fusion centers and first responders use to share data with DHS.
USAID to issue tech support RFP
The U.S. Agency for International Development plans to solicit information technology support for its humanitarian and foreign disaster assistance programs.
Almost There!
Help us tailor content specifically for you: