The U.S. Department of Homeland Security is preparing to assume "far-reaching" oversight over all civilian agency computer networks.
The U.S. Department of Homeland Security (DHS) is reportedly planning to replace the current five color-coded terror alerts with only two warnings: elevated and imminent.
ICE Director John Morton says the DHS will continue to seize domain names suspected of engaging in copyright infringement.
The Department of Homeland Security’s Customs and Border Protection (CBP) is funding the development of a game-based tool that creates high-level models for border security.
The US Department of Homeland security is planning a massive increase in the amount of covert surveillance it conducts on civilians.
Former DHS Secretary Tom Ridge has blamed outdated federal policies for preventing the US government from recruiting friendly hackers and other security experts to help protect the national cyber perimeter.
Just when you think the U.S. Department of Homeland Security has enough wonderful toys to keep them busy, they go out and add another. Get ready to have your DNA screened by the DHS.
US Senator Ron Wyden (D-OR) wants to know why the Department of Homeland Security insists on continuing its controversial policy of seizing domain names.
A high-ranking Homeland Security official is refusing to apologize for the recent DHS-led seizure of "questionable" websites.
The Department of Homeland Security (DHS) has confirmed that a number of terrorist groups - including Al Qaeda - are exploiting Facebook to recruit new members.
The US Department of Homeland Security (DHS) has embarked on a major effort to improve network security protocols in the wake of the now infamous WikiLeaks scandal.
The US Department of Defense (DoD) stands ready to defend government agencies and private companies against cyber attacks.
The Department of Homeland Security will today kick off its third major exercise testing the nations resopnse to cyber attack.
The US Department of Homeland Security (DHS) has utterly failed an extensive cyber-security audit conducted by the agency's own Inspector General (IG).