How Secure is My Data? Key Aspects of the Sony and Anthem Attacks.
Webinar

How Secure is My Data? Key Aspects of the Sony and Anthem Attacks.

The purpose of this webinar is to give an overview of the attacks;  provide expert insight into how these attacks may have occurred; discuss what type(s) of malware was used; and offer security tips and techniques that ...

A Proven Resource for Maximizing DoD Dollars
Report

A Proven Resource for Maximizing DoD Dollars

The DoD Information Analysis Centers (IACs) serve as an essential resource to affordably deliver technical data and analyses in support of current operations. The Pentagon has recognized the DoD IACs' ability to maximize ...

DISA reorganization highlights Cybersecurity
Best Practice/Reference Document

DISA reorganization highlights Cybersecurity

Latest re-org and reassignment of responsibilities.

  1. Popular Today
  2. Newest Content
  3. Recent Discussion
  4. Most Commented
  • CSIAC Admin
    07/11/2012 - 8:43am by CSIAC Admin
    Software Intensive Systems Engineering includes the entire field of software and systems engineering and related technologies;  specifically as related to information, documentation, databases,...
  • plein
    01/31/2013 - 9:26am by plein
    This standard provides a uniform approach to the classification of software anomalies, regardless of when they originate or when they are encountered within the project, product, or system life...
  • Taz Daughtrey
    02/18/2013 - 12:27pm by Taz Daughtrey
    “The Pentagon acquires IT and software-based systems the way it buys aircraft carriers—as if they were physical items to be forged or welded or mass-produced. The standard procurement cycle is...
  • tmcgibbon
    05/17/2013 - 9:26am by tmcgibbon
    Primarily in reviewing other discussion boards dealing with CMMI, there is controversy around whether CMMI for Development v1.3 has properly addressed Trustworth Systems Engineering.  Some of the...
  • CSIAC
    Cybersecurity - 4 views(s) today
    07/11/2012 - 9:15am by CSIAC
    Cybersecurity (CS) includes managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes, including analog and...
  • CSIAC Admin
    Information Assurance - 4 views(s) today
    02/03/2015 - 6:16pm by CSIAC Admin