CSIAC proudly joins the NCSA and numerous of other organizations in celebrating Data Privacy Day. CSIAC acknowledges the Internet touches all aspects of everyone's daily life and we understand there are many unknown variables on how to stay safe and secure online. Which is why we're so excited to announce we are launching a series of resources during January
CS Digest Section: CSIAC ANNOUNCEMENTS
The goal of the DoD Cybersecurity Policy Chart is to capture the tremendous breadth of applicable policies, some of which many cybersecurity professionals may not even be aware, in a helpful organizational scheme. The use of color, fonts and hyperlinks are all designed to provide additional assistance to cybersecurity professionals navigating their way
An increasing number of organizations are moving their existing infrastructure to the cloud because of the benefits it affords them. It is crucial that companies have an understanding of the various cloud deployment models, considerations that must be taken into account, and the benefits of moving to the cloud. In this episode of The CSIAC Podcast, Sean Bird
Cars, medical devices, and other products will continue to be produced with network capabilities, increasing attack surface. There is expected to be 20.4 billion IoT devices connected to the Internet by 2020. With an increasing number of devices coming online, attackers have more potential targets than ever before. Learn more about IoT devices and how you
In this webinar, Blockchain technology will be introduced from the perspectives of applications, extensible interfaces, security promises and internal mechanisms. Blockchain supports the secure storage of transactions and honestly runs smart contracts. Blockchain's internal mechanisms are sophisticated and can be viewed from different angles. This webinar
These six short cyber awareness videos feature simple steps you and your organization can take to be more secure online.
This is volume 2 of 2 special edition issues on Software Assurance. This edition explores different aspects of software assurance competencies that can be used to improve software assurance functions and how to develop/deploy assured software throughout the lifecycle acquisition process. Articles are contributed by software assurance practitioners from the
Software Defined WAN (SD-WAN) is transforming Wide Area Networks (WANs) by providing a highly available Secure WAN Transport combined with Direct Internet Access in the branches. With SD-WAN, Enterprises can mix WAN service offerings from multiple providers (MPLS, Internet, Carrier Ethernet, 3G/4G, ...) to optimize their bandwidth costs and dynamically
The essential systems that support our daily lives - such as electricity, financial institutions, and transportation - are all dependent upon the Internet. Building resilience in critical infrastructure is crucial to our national security. Week 5 will look at cybersecurity in relation to keeping our traffic lights, running water, phone lines, and other
Registered members of CSIAC.org can now easily invite others to join them and take part in CSIAC's free services and resources. Watch the short video to learn how.