In this webinar Daksha Bhasker will provide an overview of the problem at hand, walk through the STIR/SHAKEN architecture, its components, and discuss security architecture considerations that will bolster the implementation. As international regulatory bodies move towards driving security measures against robocalling, this webinar will enable security
CS Digest Section: CSIAC ANNOUNCEMENTS
CSIAC SME and member of the American Bar Association's Information Security Committee, Richard "Rick" Aldrich, gives a snapshot of the recent developments in cyberlaw, policy, standards, court cases and industry legal frameworks.
What is data manipulation? A misconception is that hackers always steal data, but this assumption is incorrect. Data manipulation attacks occur when an adversary does not take data, but instead makes subtle, stealthy tweaks to data for some type of gain or effect. These subtle modifications of data could be as crippling to organizations as data breaches.
This webinar will discuss a CSIAC-developed prototype for detecting and extracting PII from over a thousand binary file formats by leveraging the widely used open source Apache Tika toolkit. The prototype, called "BFAS - Binary File Application Scanner", integrates Tika through the implementation of a custom Powershell cmdlet which seamlessly injects a text
It may be difficult to figure out where and how Artificial Intelligence (AI) and its various sub-types (Machine Learning, Deep Learning, etc.) fit into our world as we move into the future. In some cases it seems straightforward; AI/ML speech recognition is astoundingly good and can be applied across many domains in a meaningful way. This edition of the
The Open Web Application Security Project (OWASP) Amass project was originally created when the project lead was showing organizations what they look like on the Internet. During this process, he noticed that the tools available were returning incomplete results relative to what could be discovered manually. With the identification of this gap in
This report details key concerns discussed during the JFAC/DAU/CSIAC Software Assurance (SwA) Cyber Experiment (CYBEX) on 7 Aug 2018. In addition to evaluating newly developed software SwA Program Manager and Developers guides, the exchange included addressing/bringing back foundational software/system engineering in order to address the root of fundamental
We are pleased to announce a call for papers for this year's special Modeling and Simulation (M&S) edition of the Journal of Cyber Security & Information Systems, published by the Cyber Security & Information Systems Information Analysis Center (CSIAC). This edition will highlight innovations that were achieved across the broad spectrum of defense and
Every activity a person carries out on the Internet leaves behind a trail of data commonly known as a digital footprint. The information left behind can have real-world consequences. As such it is essential that users understand how their digital footprint is created, the magnitude of that digital trail, and the steps they can take to reduce their digital
The Science of Security and Privacy (SoS) Initiative, sponsored by the National Security Agency Research Directorate, fosters a self-sustaining, open, and public security science research community to discover key cyber principles necessary to support improved explanations, predictions and confirmation or validation of predicted outcomes. The discipline of