{"id":36940,"date":"2020-09-03T00:58:10","date_gmt":"2020-09-03T00:58:10","guid":{"rendered":"https:\/\/www.threatshub.org\/blog\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\/"},"modified":"2020-09-03T00:58:10","modified_gmt":"2020-09-03T00:58:10","slug":"homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\/","title":{"rendered":"Homeland Security demands a 911 for reporting security holes in federal networks: &#8216;Vulns in internet systems cause real-world impacts&#8217;"},"content":{"rendered":"<p>The US Department of Homeland Security\u2019s Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday ordered US federal agencies outside the defense and intelligence communities to develop a working vulnerability disclosure policy.<\/p>\n<p>In an <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.cisa.gov\/blog\/2020\/09\/02\/improving-vulnerability-disclosure-together-officially\">online memo<\/a>, Bryan Ware, Assistant Director for Cybersecurity at CISA, described a scenario of walking in one&#8217;s neighborhood and calling emergency services upon seeing a house engulfed in flames.<\/p>\n<p>The government, he suggested, would benefit if people could take similar action upon finding a security flaw in a federal website. But many government websites don&#8217;t advertise how to raise the alarm or offer any assurance that vulnerability reports are welcome.<\/p>\n<p>&#8220;An open redirect \u2013 which can be used to give off-site malicious content the appearance of legitimacy \u2013 may not be on par with a fire, yet serious vulnerabilities in internet systems cause real-world, negative impacts every day,&#8221; he said.<\/p>\n<blockquote class=\"pullquote\" readability=\"6\">\n<p>A trained eye can spot critical deficiencies and yet have no one to report it to. It shouldn\u2019t be hard to tell the government of potential cybersecurity issues<\/p>\n<\/blockquote>\n<p>&#8220;In many instances, a trained eye can spot critical deficiencies and yet have no one to report it to. It shouldn\u2019t be hard to tell the government of potential cybersecurity issues \u2014 but it will be unless we\u2019re intentional about making it easier.&#8221;<\/p>\n<p>CISA&#8217;s <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/cyber.dhs.gov\/assets\/report\/bod-20-01.pdf\">Binding Operational Directive 20-01<\/a> aspires to simplify the reporting process. It requires federal agencies to provide the .gov registrar with a security contact and a responding organization for each .gov domain controlled by the agency within 30 days.<\/p>\n<p>Within 180 days, agencies must publish a vulnerability disclosure policy that describes which of its IT systems are within the policy&#8217;s scope, the type of testing permitted, how to file a vulnerability report, and commitments to avoid recommending legal action for good faith reporting and to set expectations for a response. Agencies also must report applicable metrics after that.<\/p>\n<p>These policies may not require the submission of personally identifiable information, though they may request it. They must be open to anyone, just not specific groups or US citizens. And they may not limit the bug reporter&#8217;s ability to disclose the flaw elsewhere, though they may request non-disclosure for a limited response period.<\/p>\n<p>The directive also recommends that agencies consider stating that they will not pay for vulnerability submissions and that such submissions represent a waiver of any claim to compensation. But it allows agencies to operate a separate bug bounty program, which is not the same as a vulnerability disclosure policy.<\/p>\n<div class=\"promo_article\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/regmedia.co.uk\/2019\/11\/06\/shutterstock_bug.jpg?x=174&amp;y=115&amp;crop=1\" width=\"174\" height=\"115\" alt=\"Software bug \"><\/p>\n<h2 title=\"'A secure dev lifecycle has a much higher ROI than letting the public do the bug detection work for you'\">Microsoft forked out $13.7m in bug bounties. The reward program&#8217;s architect thinks the money could be better spent<\/h2>\n<p><a href=\"https:\/\/www.theregister.com\/2020\/08\/04\/microsoft_137_bug_bounties\/\"><span>READ MORE<\/span><\/a><\/div>\n<p>Katie Moussouris, CEO of Luta Security, welcomed the move but suggested the feds are putting the cart before the horse. &#8220;You can\u2019t just throw a point of contact up to solicit vulnerability reports from the public with no process behind it and expect good security as a result,&#8221; she wrote in a <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/www.lutasecurity.com\/post\/who-s-in-the-bbq-pit-with-usg\">blog post<\/a>.<\/p>\n<p>Moussouris pointed to comments she and her colleagues made as the directive was being drafted warning that the policy does not require agencies to allocate staff or to provision infrastructure for receiving reports and responding to them.<\/p>\n<p>&#8220;Failure to set aside adequate resources for these efforts will undermine the utility of the [directive] and erode the positive benefits associated with the [vulnerability disclosure policies],&#8221; <a target=\"_blank\" rel=\"nofollow noopener noreferrer\" href=\"https:\/\/github.com\/cisagov\/cyber.dhs.gov\/issues\/133#issue-548420211\">the comment<\/a> says.<\/p>\n<p>In other words, it&#8217;s not enough for each agency to set up the equivalent of a 911 call center to field vulnerability reports. The Feds also need to invest in first responders and equipment to put out the fire. \u00ae<\/p>\n<p> READ MORE <a href=\"https:\/\/go.theregister.com\/feed\/www.theregister.com\/2020\/09\/03\/us_bug_bounty\/\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Great \u2013 and who will be the first responders? The US Department of Homeland Security\u2019s Cybersecurity and Infrastructure Security Agency (CISA) on Wednesday ordered US federal agencies outside the defense and intelligence communities to develop a working vulnerability disclosure policy.\u2026 READ MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":36941,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[63],"tags":[],"class_list":["post-36940","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-the-register"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Homeland Security demands a 911 for reporting security holes in federal networks: &#039;Vulns in internet systems cause real-world impacts&#039; 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Homeland Security demands a 911 for reporting security holes in federal networks: &#039;Vulns in internet systems cause real-world impacts&#039; 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-03T00:58:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"174\" \/>\n\t<meta property=\"og:image:height\" content=\"115\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Homeland Security demands a 911 for reporting security holes in federal networks: &#8216;Vulns in internet systems cause real-world impacts&#8217;\",\"datePublished\":\"2020-09-03T00:58:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\\\/\"},\"wordCount\":621,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts.jpg\",\"articleSection\":[\"The Register\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\\\/\",\"name\":\"Homeland Security demands a 911 for reporting security holes in federal networks: 'Vulns in internet systems cause real-world impacts' 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts.jpg\",\"datePublished\":\"2020-09-03T00:58:10+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts.jpg\",\"width\":174,\"height\":115},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Homeland Security demands a 911 for reporting security holes in federal networks: &#8216;Vulns in internet systems cause real-world impacts&#8217;\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Homeland Security demands a 911 for reporting security holes in federal networks: 'Vulns in internet systems cause real-world impacts' 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\/","og_locale":"en_US","og_type":"article","og_title":"Homeland Security demands a 911 for reporting security holes in federal networks: 'Vulns in internet systems cause real-world impacts' 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-09-03T00:58:10+00:00","og_image":[{"width":174,"height":115,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Homeland Security demands a 911 for reporting security holes in federal networks: &#8216;Vulns in internet systems cause real-world impacts&#8217;","datePublished":"2020-09-03T00:58:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\/"},"wordCount":621,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts.jpg","articleSection":["The Register"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\/","url":"https:\/\/www.threatshub.org\/blog\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\/","name":"Homeland Security demands a 911 for reporting security holes in federal networks: 'Vulns in internet systems cause real-world impacts' 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts.jpg","datePublished":"2020-09-03T00:58:10+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2020\/09\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts.jpg","width":174,"height":115},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/homeland-security-demands-a-911-for-reporting-security-holes-in-federal-networks-vulns-in-internet-systems-cause-real-world-impacts\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Homeland Security demands a 911 for reporting security holes in federal networks: &#8216;Vulns in internet systems cause real-world impacts&#8217;"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=36940"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/36940\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/36941"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=36940"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=36940"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=36940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}