department of homeland security flag

Federal Cybersecurity Agency Prioritizes Addressing Chinese Threats, Improving Election Security

The leader of the Cybersecurity and Infrastructure Agency, which works within DHS, is concerned primarily with risk management, Chinese threats to supply chains and election security.

The Department of Homeland Security’s central cybersecurity agency is focused on addressing the “persistent threat” posed by Chinese hackers, improving election security and defending against ransomware attacking government systems, according to a strategy memo released by the department. 


In his agency’s “strategic intent” document, Christopher Krebs, the director of the Cybersecurity and Infrastructure Security Agency (CISA), said the agency is looking to improve the country’s supply chain risk management when it comes to China. The U.S. has consistently accused Chinese hackers of attempting to compromise American companies and systems, particularly through 5G or other technology. 


Krebs laid out the plans during a speech at Auburn University last week, describing CISA’s principles as “Defend today. Secure tomorrow.” 


“Defending today, we’re working with state and local governments to help protect themselves, to help defend their networks so they’re not tomorrow’s headline,” Krebs said, according to MeriTalk. “The secure tomorrow piece is a little bit different. Securing tomorrow is about, what does the next generation of technology look like, and have we baked in the appropriate security concepts?”


Krebs added that the agency spends “probably 40 to 50 percent” on election security issues as DHS and other departments recognize the threats posed by Russian interference and how to address them. 


“I know what the Russians did in 2016, I know what they tried to do in 2018, I need to know what they’re going to try to do in 2020,” Krebs said, according to The Hill.


Lawmakers have recently battled over election security measures, as Democrats push for legislation that would establish federal standards for states, which are responsible for administering and counting ballots. Senate Majority Leader Mitch McConnell and other Republicans say there is no need to bring election security bills forward, citing improvements that states have made in securing election machines, buying new equipment and other measures. 


But cybersecurity experts continue to sound the alarm over the issue, blaming private companies for selling machines that are not properly secured and counties for buying the equipment out of convenience. Dan Wallach, a Rice University computer science professor who has done extensive research on voting machines, said that vendors sell what local officials want to buy. 


“The vendors appear not to have the self-awareness that it might be a bad thing for our democracy to sell inadequately secure equipment,” Wallach told POLITICO


Krebs said that his priorities are improving risk management strategies across the federal government and working to “increase a defense posture across the civilian government agencies.” Whatever goals he and the department sets, they can only be achieved through better collaboration across federal, state and local governments and partnerships with industry and academic leaders, he said. 


“Whatever we do has to be done together, and in cybersecurity, that is the only way we’re going to get it done,” Krebs said. “It has to be a collective defense approach.”

Featured

  • Empowering and Securing a Mobile Workforce

    What happens when technology lets you work anywhere – but exposes you to security threats everywhere? This is the reality of modern work. No longer tethered to desks, work happens everywhere – in the office, from home, on the road, and in countless locations in between. Read Now

  • TSA Introduces New $45 Fee Option for Travelers Without REAL ID Starting February 1

    The Transportation Security Administration (TSA) announced today that it will refer all passengers who do not present an acceptable form of ID and still want to fly an option to pay a $45 fee to use a modernized alternative identity verification system, TSA Confirm.ID, to establish identity at security checkpoints beginning on February 1, 2026. Read Now

  • The Evolution of IP Camera Intelligence

    As the 30th anniversary of the IP camera approaches in 2026, it is worth reflecting on how far we have come. The first network camera, launched in 1996, delivered one frame every 17 seconds—not impressive by today’s standards, but groundbreaking at the time. It did something that no analog system could: transmit video over a standard IP network. Read Now

  • From Surveillance to Intelligence

    Years ago, it would have been significantly more expensive to run an analytic like that — requiring a custom-built solution with burdensome infrastructure demands — but modern edge devices have made it accessible to everyone. It also saves time, which is a critical factor if a missing child is involved. Video compression technology has played a critical role as well. Over the years, significant advancements have been made in video coding standards — including H.263, MPEG formats, and H.264—alongside compression optimization technologies developed by IP video manufacturers to improve efficiency without sacrificing quality. The open-source AV1 codec developed by the Alliance for Open Media—a consortium including Google, Netflix, Microsoft, Amazon and others — is already the preferred decoder for cloud-based applications, and is quickly becoming the standard for video compression of all types. Read Now

  • Cost: Reactive vs. Proactive Security

    Security breaches often happen despite the availability of tools to prevent them. To combat this problem, the industry is shifting from reactive correction to proactive protection. This article will examine why so many security leaders have realized they must “lead before the breach” – not after. Read Now

New Products

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis.

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.