The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
The new policy overrides two previous memorandums that charged DISA with assessing the security of commercial cloud service offerings and cataloging them.
South Korea is seeking the help of China over a cyber-attack on its nuclear power network after the IP address of a suspected hacker was traced to a north-eastern Chinese city.
No Rules of Cyber War - Politico
U.S. in uncharted waters with 'proportionate response' on hack attacks.
5 Small Business Takeaways From Sony’s Hack - Fox Business
Small businesses may not be the prime target for a hack on the scale of the recent attack on Sony Pictures, but that doesn't mean it can't happen.
The hacking organization that took credit for infiltrating Sony Pictures Entertainment and stealing 10TB worth of data has also threatened at least one news media organization.
Norse, the cybersecurity firm that first identified a potential insider in the massive November hack of Sony Pictures, believes it's uncovered evidence on six individuals primarily involved in the attack.
Network intruders compromised health information on current and former U.S. Postal Service employees who filed for workers' compensation.
New Form of Memory Could Advance Brain-Inspired Computers - Technology Review
A new kind of computer memory could help make more capable computer chips that function more like biological brains, say IBM researchers.
The French government can now collect data about users.
5 Key Tech Bills Passed by Congress in 2014 - Next Gov
Significant legislative efforts approved by lawmakers this year, ranging from reforming information technology acquisition to strengthening the Department of Homeland Security's role in securing federal networks from cyberattacks.
Facebook users are targeted by attacks that exploit a same origin policy (SOP) flaw in the web browser of the Android OS lower than 4.4.
Security researchers from Positive Technologies have stated that almost all 4G USB modems and SIM cards contain exploitable vulnerabilities through which can give full control of the devices to which they are connected to the hackers.
How a DHS Document Dump Imperiled U.S. Security - Government Executive
Homeland Security inadvertently released more than 800 pages of information about how to hack energy infrastructure.
Tor Responds To The Cyber Attack On Its Network - Business Insider
The Tor Project on Saturday morning acknowledged a cyber attack on this network.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.