Homeland Security Has Long Way to GoWith the two-year anniversary of the Sept. 11 terrorist attacks approaching, the homeland security effort remains hamstrung by a lack of connectivity, multiple watch lists, duplication of effort and a lack of consensus about which agency is ultimately responsible for threat-data integration and analysis, according to a story in ComputerWorld. The story reports that the House Select Committee on Homeland Security raised questions about a perceived lack of responsibility and accountability in the federal homeland security structure, as well as the impact that the newly created Terrorist Threat Integraion Center an organization that reports to no single agency or cabinet secretary could have on privacy. New Rules Proposed for Customs InspectionsWashington Post. The Post reports that the proposed regulations would require all shippers to electronically transmit information about their goods and the recipients far enough before arrival to allow Customs to determine whether it needs to intensively inspect the cargo. U.S. Customs and Border Protection proposed stiff new regulations yesterday designed to prevent terrorists from sneaking weapons or operatives into the United States in cargo shipments, according to a story in the ID Thief Exploited Public Use of PasswordsAssociated Press. The story reports that the thief, Juju Jiang, was caught when he used one of the stolen passwords to access a computer with GoToMyPC software, which lets individuals access their own computers from elsewhere. For more than a year, unbeknownst to people who used Internet terminals at Kinko’s stores in New York, an identity thief was recording what they typed, paying particular attention to their passwords, according to a story reported by the Related content news analysis DHS unveils one common platform for reporting cyber incidents Ahead of CISA cyber incident reporting regulations, DHS issued a report on harmonizing 52 cyber incident reporting requirements, presenting a model common reporting platform that could encompass them all. By Cynthia Brumfield Sep 25, 2023 10 mins Regulation Regulation Regulation news Chinese state actors behind espionage attacks on Southeast Asian government The distinct groups of activities formed three different clusters, each attributed to a specific APT group. By Shweta Sharma Sep 25, 2023 4 mins Advanced Persistent Threats Cyberattacks feature How to pick the best endpoint detection and response solution EDR software has emerged as one of the preeminent tools in the CISO’s arsenal. Here’s what to look for and what to avoid when choosing EDR software. By Linda Rosencrance Sep 25, 2023 10 mins Intrusion Detection Software Security Monitoring Software Data and Information Security feature Top cybersecurity M&A deals for 2023 Fears of recession, rising interest rates, mass tech layoffs, and conservative spending trends are likely to make dealmakers cautious, but an ever-increasing need to defend against bigger and faster attacks will likely keep M&A activity steady in By CSO Staff Sep 22, 2023 24 mins Mergers and Acquisitions Data and Information Security IT Leadership Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe