The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
CSIAC ANNOUNCEMENTS:
CSIAC Webinar, Tomorrow, September 17 @ 1300 EDT: Threat Intelligence Program - CSIAC
Join CSIAC on Thursday, Sept. 17 at 1300 EDT for a webinar presentation titled, "Threat Intelligence Program." Please register in advance at https://www.anymeeting.com/PIID=EF54DD89824F3E. This webinar covers important building blocks to establish, maintain, and manage a threat intelligence program at your organization.
RECENT HEADLINES:
National Insider Threat Awareness Month - CISA.gov
September is National Insider Threat Awareness Month (NITAM), which is a collaborative effort between the National Counterintelligence and Security Center (NCSC), National Insider Threat Task Force (NITTF), Office of the Under Secretary of Defense Intelligence and Security (USD(I&S)), Department of Homeland Security (DHS), and Defense Counterintelligence and Security Agency (DCSA) to emphasize the importance of detecting, deterring, and reporting insider threats.
Tags: National Insider Threat Awareness Month (NITAM)
Army seeks to minimize command posts electronic signature, avoid detection - ARMY
ABERDEEN PROVING GROUND, Md. (Aug. 25, 2020) Army Futures Command (AFC) is assessing commercial communications technologies that will be integrated in the next generation of command posts.The Command, Control, Communications, Computers, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR) Center a component of AFC s Combat Capabilities
Tags: None
Alert (AA20-245A) – Technical Approaches to Uncovering and Remediating Malicious Activity - CISA.gov
This joint advisory is the result of a collaborative research effort by the cybersecurity authorities of five nations: Australia,[1] Canada,[2] New Zealand,[3][4] the United Kingdom,[5] and the United States.[6] It highlights technical approaches to uncovering malicious activity and includes mitigation steps according to best practices. The purpose of this report is to enhance incident response among partners and network administrators along with serving as a playbook for incident investigation.
Tags: Alert (AA20-245A), Cybersecurity Information Sharing Act (CISA)
Natural Radiation Can Interfere with Quantum Computers - PNNL.Gov
A multi-disciplinary research team has shown that radiation from natural sources in the environment can limit the performance of superconducting quantum bits, known as qubits. The discovery, reported today in the journal Nature, has implications for the construction and operation of quantum computers, an advanced form of computing that has attracted billions of dollars in public and private investment globally.
Tags: Quantum Computing
DoD partners with agencies to use AI for disaster, humanitarian relief - ARMY
WASHINGTON -- The Defense Department is partnering with other agencies to develop deep-learning artificial intelligence algorithms to provide near-real-time data to improve the decision-making of first responders engaged in natural disasters and humanitarian assistance efforts.Representatives from DOD and its partners the Energy Department and Mi
Tags: None
CISA, Treasury, FBI and USCYBERCOM Release Cyber Alert on Latest North Korea Bank Robbing Scheme - CISA
WASHINGTON The Cybersecurity and Infrastructure Security Agency (CISA), the Department of the Treasury (Treasury), the Federal Bureau of Investigation (FBI) and U.S. Cyber Command (USCYBERCOM) are issuing a joint technical alert about an ongoing automated teller machine (ATM) cash-out scheme by North Korean government cyber actors referred to by the U.S. government as FASTCash 2.0: North Korea's BeagleBoyz Robbing Banks.
Tags: Cybersecurity
Army robo-teammate can detect, share 3-D changes in real-time - ARMY
ADELPHI, Md. -- Something is different, and you can t quite put your finger on it. But your robot can.Even small changes in your surroundings could indicate danger. Imagine a robot could detect those changes, and a warning could immediately alert you through a display in your eyeglasses. That is what U.S. Army scientists are developing with sensors
Tags: None
Cybersecurity Officials from U.S., U.K., Australia, Canada and New Zealand Release Best Practices for Incident Response - CISA
WASHINGTON Today, the U.S. Cybersecurity and Infrastructure Security Agency (CISA), Australian Cyber Security Centre (ACSC), New Zealand s National Cyber Security Centre (NCSC NZ) and Computer Emergency Response Team NZ (CERT NZ), Canada s Communications Security Establishment, and the United Kingdom s National Cyber Security Centre (NCSC UK), are releasing a Joint Cybersecurity Advisory: Technical Approaches to Uncovering and Remediating Malicious Activity.
Tags: Cybersecurity
CISA Releases 5G Strategy for Secure and Resilient Critical Infrastructure - CISA
Today, the Cybersecurity and Infrastructure Security Agency (CISA) released its strategy to ensure the security and resilience of fifth generation (5G) technology in our nation.
Tags: Cybersecurity, Infrastructure Security
CSIAC Supported Communities
CSIAC supports several communities of practice, such as the Cyber Community of Interest (COI) Group and research & development working groups.
Technical Resources, Policy and Guidance
This list of related sites provides additional sources to pursue the topic of Cybersecurity. The sites include Government organizations, including federal agencies, Department of Defense and military service agencies, commercial organizations, and academic institutions.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.
Leave a Comment
You must be logged in to post a comment.