May 21, 2018 By David Bisson 2 min read

The Department of Homeland security (DHS) has a new plan to reduce software vulnerabilities, counter malicious actors, respond to incidents and build resiliency. The DHS released a national cybersecurity strategy on May 15, which focused on addressing the evolving digital threat landscape. The unveiled plan is part of the organization’s commitment to implement these cybersecurity responsibilities over the next five years.

DHS Cybersecurity: ‘A Historic Turning Point’

Kirstjen Michele Nielsen, the DHS secretary, explained that the new national cybersecurity strategy responds to changes in the threat landscape. She found the convergence of digital security with personal and private security particularly remarkable — calling this a “historic turning point” that necessitates a reevaluation of her department’s approach to cybersecurity.

“In an age of brand-name breaches, we must think beyond the defense of specific assets — and confront systemic risks that affect everyone from tech giants to homeowners,” Nielsen said in a DHS press release. “Our strategy outlines how DHS will leverage its unique capabilities on the digital battlefield to defend American networks and get ahead of emerging cyberthreats.”

5 Security Objectives of the DHS

The DHS divided its strategy into five pillars:

  1. Bolster risk identification: Understand the department’s posture concerning national cybersecurity risk and prioritize responsive risk management efforts.
  2. Reduce vulnerabilities: Help federal agencies patch up weak points in their networks so they can achieve a reasonable level of cybersecurity.
  3. Diminish threats: Combat transnational criminal organizations and individual actors who abuse the digital space.
  4. Mitigate consequences: Minimize the effects of potentially significant security incidents through the cooperation of the entire community.
  5. Enable cybersecurity outcomes: Support activities and efforts that promote global risk management activities while making the department’s cybersecurity efforts more integrated and streamlined.

The DHS explained it intends to pursue these objectives while upholding the national values of the U.S. and protecting the civil liberties of Americans.

Collaboration in the Name of a Safer World

In its national cybersecurity strategy, the DHS revealed that it would not be able to tackle the majority of its goals alone. It said it would need to draw from the strength of the international community to track down criminals, prepare for attacks (on the scale of WannaCry or NotPetya) and promote risk management worldwide. Toward that end, it expressed its commitment to support research into security innovations that help better protect its networks as well as other organizations’ systems.

More from

How cyber criminals are compromising AI software supply chains

3 min read - With the adoption of artificial intelligence (AI) soaring across industries and use cases, preventing AI-driven software supply chain attacks has never been more important.Recent research by SentinelOne exposed a new ransomware actor, dubbed NullBulge, which targets software supply chains by weaponizing code in open-source repositories like Hugging Face and GitHub. The group, claiming to be a hacktivist organization motivated by an anti-AI cause, specifically targets these resources to poison data sets used in AI model training.No matter whether you use…

New report shows ongoing gender pay gap in cybersecurity

3 min read - The gender gap in cybersecurity isn’t a new issue. The lack of women in cybersecurity and IT has been making headlines for years — even decades. While progress has been made, there is still significant work to do, especially regarding salary.The recent  ISC2 Cybersecurity Workforce Study highlighted numerous cybersecurity issues regarding women in the field. In fact, only 17% of the 14,865 respondents to the survey were women.Pay gap between men and womenOne of the most concerning disparities revealed by…

Getting “in tune” with an enterprise: Detecting Intune lateral movement

13 min read - Organizations continue to implement cloud-based services, a shift that has led to the wider adoption of hybrid identity environments that connect on-premises Active Directory with Microsoft Entra ID (formerly Azure AD). To manage devices in these hybrid identity environments, Microsoft Intune (Intune) has emerged as one of the most popular device management solutions. Since this trusted enterprise platform can easily be integrated with on-premises Active Directory devices and services, it is a prime target for attackers to abuse for conducting…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today