Home / News / Doug Maughan: DHS to Key 2015 Cyber Funding Awards on Forensics, Remote Access

Doug Maughan: DHS to Key 2015 Cyber Funding Awards on Forensics, Remote Access

Doug Maughan

Doug Maughan, director of the Department of Homeland Security science and technology directorate’s cybersecurity division, has said DHS will award $95 million in contracts during fiscal year 2015 to develop new cybersecurity technologies, Federal News Radio reported Friday.

Jason Miller writes the DHS intends for the cybersecurity systems to protect cars, home devices and medical equipment.

“We are looking at it on two fronts. One is on the forensics front to analyze the data in the car if needed for forensics purposes,” Maughan told the station.

“The other one is we are working with automotive manufacturers in developing standards that they can require of their third-party vendors so we can make cars more secure from the standpoint of remote access,” he added.

DHS received more than 300 white papers from industry, academia and international partners, out of which the agency plans to carry forward up to 30 proposals, Maughan told Federal News Radio.

Miller writes the DHS also seeks partnership with Department of Health and Human Services and the Food and Drug Administration to finance research efforts for medical device security.

Maughan added that law enforcement officers also want technologies they can use to extract data from devices, the station reports.

Check Also

Lead HHS Cyber Auditor Says Team ‘Well Aligned’ to Face Challenges

The head of cybersecurity at the Health and Human Services Department’s Office of the Inspector General recently said that he and his team are learning as much as they can about supply chain threats and application development security, to respond to such issues effectively, Federal News Network reported Friday. Jarvis Rodgers, HHS OIG Cybersecurity and IT Audit Division director, told Federal News Network via email that his unit is aware that risks related to global supply chains “present a unique set of challenges” and that poorly written code can result in costly and persistent security vulnerabilities.

Leave a Reply

Your email address will not be published. Required fields are marked *