The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
This short video attempts to simplify a number of cybersecurity concepts and practices to help individuals prevent many common and avoidable cybersecurity pitfalls.
Tags: CSIAC Podcast
The blockchain technology is a game changer to enhance the security of our supply chain, and smart manufacturing. The technology enables the tracking and recording of the history of each transaction in a ledger stored in the cloud that cannot be altered, and when combined with digital signatures, verifies the identity of the participants with its non-repudiation capabilities. Dr. Bertrand Cambo will present the prototypes developed at Northern Arizona University (NAU) demonstrating the feasibility of the schemes, and discuss the challenges to deploy this blockchain technology to established manufacturing subcontractors.
Tags: Blockchain, Supply Chain Management
DOD released its new Cybersecurity Maturity Model Certification (CMMC) on January 31st, billed by the undersecretary of defense for acquisition and sustainment as "Version 1.0." By the end of September, the Defense Department will require at least some companies bidding on defense contracts to certify that they meet at least a basic level of cybersecurity standards when responding to a request for proposals.
Tags: CMMC, Defense Contractors, Reform
US Army Sleuths Seek Social-Media Search Services - Defense One
The Army's Criminal Investigation Command conducts extensive probes into threats against the military branch and its personnel. This week, insiders unveiled their intent to glean new mission-relevant evidence through the forensic analysis of social media posts.
Tags: Criminal Investigation Command, Social Media
Pentagon weapons tester hones in on cyber tools - Fifth Domain
The Pentagon's weapons tester has bolstered its focus on cyber capabilities pursued by the department through U.S. Cyber Command and its service acquisition executives, according to its annual report.
Tags: Director Operational Test and Evaluation (DOT&E), Joint Cyber Warfighting Architecture
The Defense Department has discovered new problems associated with Lockheed Martin's F-35 fighter jet in its annual review, including issues with the accuracy of its 25mm gun, Bloomberg reports.
Tags: Department of Defense (DoD), F-35, Pentagon
A researcher has discovered more than 60 vulnerabilities across 20 physical security products, including critical flaws that can be exploited remotely to take complete control of a device.
Tags: Physical Security Systems, Vulnerabilities
An upcoming meeting of presidential advisers promises an update on the importance of software-defined networking to national security and emergency preparedness as pressure builds for the administration to support coordinated investment in the technology.
Tags: Cyber Legislation, Software Defined Network (SDN)
Imperiled Information – Students Find Website Data Leaks Pose Greater Risks Than Most People Realize - Harvard SEAS
It turns out data leaks pose much greater threats than most people realize, and a hacker could easily find and exploit sensitive information on not only a person's virtual identity, but also his or her real identity.
Tags: Data Leaks, Personally Identifiable Information (PII)
CSIAC supports several communities of practice, such as the Cyber Community of Interest (COI) Group and research & development working groups.
This list of related sites provides additional sources to pursue the topic of Cybersecurity. The sites include Government organizations, including federal agencies, Department of Defense and military service agencies, commercial organizations, and academic institutions.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.