In an effort to replace costly and aging technology and rightsize its data center footprint, the Homeland Security Department (DHS) is looking to shift significant portions of its $6.8 billion IT portfolio to the cloud.
Posts Tagged: dhs
In response to network security challenges, the Department of Homeland Security created the Continuous Diagnostics and Mitigation, or CDM, program. The CDM Program is organized into four distinct phases designed to address each layer of agency cybersecurity. We’re tackling Phase 4.
CISA released an emergency directive about a number of incidents concerning Domain Name System (DNS) infrastructure tampering.
As part of the expanding Continuous Diagnostics and Mitigation (CDM) program, the Homeland Security Department (DHS) plans to bring on another 30 employees to evaluate, monitor and standardize cybersecurity capabilities across agencies.
The Homeland Security Department is taking a multi-pronged approach to cybersecurity — one that will more clearly define its role and expectations of agencies.
The MGT Act has revamped national efforts to upgrade IT systems, but there remain fundamental questions about the government’s role in technology.
In addition to its work with FEMA, DHS Digital Service has also made significant improvements to USCIS, particularly on the Electronic Immigration System.
Efficiency is everything in government. That’s why increasing productivity has stepped into the spotlight for government organizations as they seek new methods to serve increasing citizen expectations. But how can government productivity be increased with lacking resources and rampant budget cuts?
There’s a growing appetite among federal CIOs to move from merely talking about transforming government IT and cyber, to actually institutionalizing change.
In an effort to enhance the federal government’s cyber posture, the Department of Homeland Security created the Continuous Diagnostics and Mitigation, or CDM, program. CDM provides DHS, and other federal agencies, the capabilities and tools to identify cybersecurity risks on an ongoing basis, as well as detect and respond to threats in real time. TheRead… Read more »