A Critical Policy Update: What to Watch For in Implementation of NSM 22
Stanford Report Calls for Overhaul of Online Child Exploitation Reporting System
GAO: DHS Streamlines Internal Collaboration to Enhance Information Sharing and Threat Response
RobbinHood Ransomware Campaign Targeting Government Networks
GAO: Agencies Reap Benefits of Cloud Computing, But Accounting Falls Short
Here Are CISA’s 55 Make-or-Break National Critical Functions, Setting Stage for ‘Risk Register’
Faith-Based ISAO Raises U.S. Houses of Worship Threat Level to ‘Elevated’
UN: Fight Terrorism with Information Sharing and Focus on Financial Intelligence
Former Boston Chief on Preparing for Next Terror Attack: Get ‘Ready to Be Overwhelmed’
Britain Invites Five Eyes Partners to Trade Internet Crime Secrets
INTERPOL Sends Team to Sri Lanka to Help Investigate Easter Attacks
Ten Federal Agencies Begin Working Dog Collaboration
NICC Links Private Sector to Critical Infrastructure Info Amid ‘Ever-Changing’ Threats
U.S. Hosts Security Leaders from Around the World to Combat Transnational Crime and Terrorism
How to Move Technology Into DHS Faster
CISA Chief Harrell’s Warning on Drones: ‘The Overhead Threat Is Absolutely Real’
Clouds Remain over Cross-Border Data Storage Amid Calls for International Model
PERSPECTIVE: Why Are We Ignoring the Right-Wing Extremism Threat?
Evanina: Root Out Supply Chain’s Weak Links in Private Sector, Procurement Departments