How Secure is My Data? Key Aspects of the Sony and Anthem Attacks.
Webinar

How Secure is My Data? Key Aspects of the Sony and Anthem Attacks.

The purpose of this webinar is to give an overview of the attacks;  provide expert insight into how these attacks may have occurred; discuss what type(s) of malware was used; and offer security tips and techniques that ...

A Proven Resource for Maximizing DoD Dollars
Report

A Proven Resource for Maximizing DoD Dollars

The DoD Information Analysis Centers (IACs) serve as an essential resource to affordably deliver technical data and analyses in support of current operations. The Pentagon has recognized the DoD IACs' ability to maximize ...

DISA reorganization highlights Cybersecurity
Best Practice/Reference Document

DISA reorganization highlights Cybersecurity

Latest re-org and reassignment of responsibilities.

  1. Popular Today
  2. Newest Content
  3. Recent Discussion
  4. Most Commented
  • CSIAC
    Cybersecurity - 41 views(s) today
    07/11/2012 - 9:15am by CSIAC
    Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and...
  • showard
    06/21/2013 - 11:32am by showard
    The advent and evolution of the Smart Grid initiative to improve the electric utility power infrastructure has brought with it a number of opportunities for improving efficiencies, but along with...
  • CSIAC Admin
    07/11/2012 - 8:43am by CSIAC Admin
    Software Intensive Systems Engineering includes the entire field of software and systems engineering and related technologies;  specifically as related to information, documentation, databases,...
  • Taz Daughtrey
    03/27/2013 - 1:57pm by Taz Daughtrey
    G. Dondossola, F. Garrone, J. Szanto. “Performance evaluation of standard power grid communications experiencing cyber anomalies.” 50th Fitce International Congress. Palermo. September...
  • showard
    10/25/2013 - 10:19am by showard
    1. Abstract: Mobile network operators (MNOs) must grapple with complex security management in fourth generation Long Term Evolution (4G LTE) deployments. The security architecture of 4G LTE may...
  • CSIAC Admin
    03/24/2015 - 8:14am by CSIAC Admin
    The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability...