The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
Free CSIAC Webinar – Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations - CSIAC
This webinar will explain in detail the changes contained in SP 800-171 revision 1 and various FAR/DFAR hooks into the document, impacts it has on your organization, and how you can continue to implement its IA guidelines.
A Cloud for the Artificial Mind: This Data Center is Designed for Deep Learning - Data Center Knowledge
Over the last five years or so, Machine Learning, a type of AI, has been a quickly rising tide that’s now starting to permeate nearly every corner of technology.
Physical keys are supposed to be more effective than mobile apps and SMS verification, because there's no chance of phishing or man-in-the-middle attacks.
British Man Arrested Over Links to Hacking Washington DC’s CCTV network - International Business Times
A couple including a British man has been arrested by UK authorities as part on an ongoing investigation into a massive cyber attack that disabled 123 of 187 police security cameras in Washington DC just prior to the inauguration of Donald Trump on 20 January.
Blockchain’s Brilliant Approach to Cybersecurity - Venturebeat
Hackers can shut down entire networks, tamper with data, lure unwary users into cybertraps, steal and spoof identities, and carry out other devious attacks by leveraging centralized repositories and single points of failure.
$3.2 Million HIPAA Fine: An Analysis - Data Breach today
A key lesson to be learned from this case "is that the Office for Civil Rights can only be pushed so far when a covered entity or business associate is shown to have systemic, management-driven failures in putting into place safeguards to protect its health information," says privacy attorney David Holtzman, vice president at the security consulting firm CynergisTek.
An advisory published earlier today reveals that the vulnerability resides in the SMB service, and the US-CERT says that both Windows 8.1 and Windows 10 are exposed to attacks. There are reports claiming that Windows Server systems could also be affected, but there's still no confirmation in this regard.
Many Android VPN Apps Breaking Privacy Promises - ThreatPost
An alarming number of Android VPNs are providing a decidedly false sense of security to users, especially those living in areas where communication is censored or technology is crucial to the privacy and physical security.
Microsoft Ventures Backs Illusive Networks, a Cybersecurity Firm That Protects With Deception - TECHCRUNCH
Illusive Networks, a cybersecurity startup based out of Israel that protects networks by building "deception" frameworks to identify and trap malicious hackers, is today announcing that it has added Microsoft Ventures - the software giant's young investment arm - as its newest strategic investor.
It's the first time quantum has been used to fight cyber crime, and if it works, it could reshape how security analysts protect their networks from harm.
The incredibly clever technique involves a fake but convincing and functional Gmail sign-in page.
Some browsers will turn over a user's autofill information - even when the website doesn't ask for it.
US Office of the Director of National Intelligence releases unclassified version of intel community's findings on Russia's attempts to influence US presidential race via cyberattacks, leaks, and pure propaganda.
Cyber Security of Critical Infrastructure - Department of Homeland Security
CSIAC serves on the EO 13636/PPD-21 Research & Development (R&D) Working Group (WG) run by DHS S&T. If you would like further information, contact Dr. Paul Losiewicz at email@example.com
The Cyber COI engages in multiple activities and forums for coordinating cyber S&T strategies, sharing innovative ideas and technical approaches, promoting technology transfer and upcoming business opportunities, and in jointly planning programs across the Department of Defense and other government agencies. Membership is based upon approval by the Cyber COI group administrator.
DOD OSBP officials acknowledged that cybersecurity is an important and timely issue for small businesses -and therefore the office is considering incorporating cybersecurity into its existing outreach and education efforts. During the review, GAO identified 15 existing federal cybersecurity resources that DOD OSBP could disseminate to defense small businesses.
DHS S&T Collaboration Community - Ideascale
The National Conversation is intended to bring together everyone to play a role in shaping the future of homeland security technology. This means responders, operational users, citizens, academia, and industry.
The Department of Defense Cyber Strategy - Department of Defense
The purpose of this strategy is to guide the development of DoD's cyber forces and strengthen our cyber defense and cyber deterrence posture. It focuses on building cyber capabilities and organizations for DoD's three primary cyber missions.
The Information Sharing Environment (ISE) broadly refers to the people, projects, systems, and agencies that enable responsible information sharing for national security.
Standards & Reference Documents - CSIAC
View all Best Practices and Reference Documents on the CSIAC website.
DoD Cyber Domain Resources - Department of Defense
DHS Cyber Security Strategy (“Blueprint for a Secure Cyber Future”, 2011) - Department of Homeland Defense
DIB CS/IA Voluntary Information Sharing Program - DoD DIBNet
DoD's DIB CS/IA program is a voluntary program to enhance and supplement DIB participants' capabilities to safeguard DoD information that resides on, or transits, DIB unclassified information systems.
US-CERT Bulletins - Department of Homeland Security
Bulletins provide weekly summaries of new vulnerabilities. Patch information is provided when available.
US-CERT Alerts - Department of Homeland Security
Alerts provide timely information about current security issues, vulnerabilities, and exploits.
NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.
Trustworthy CyberSpace: Strategic Plan For The Federal Cybersecurity Research and Development Program - NITRD
Committee on National Security Systems (CNSS) - Committee on National Security Systems
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.