The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
This webinar will describe Comply to Connect (C2C), an automated Network Access Control (NAC) solution that verifies that an endpoint is authorized and meets security requirements before allowing access to the network. These solutions take a standards-based approach to security and the goal is to always know what devices are on your network and to control what resources they can access.
Top Bank Executives Required to Vouch for Cyber Attack Defences - News on a Hand
A new regulation, which takes effect on March 1, requires companies supervised by New York’s Department of Financial Services to establish and maintain a cyber security program that can protect consumers’ private data and "ensure the safety and soundness" of the state’s financial services industry.
When you think about the threats to your company’s cybersecurity, you probably think of malicious emails and spearphishing, hacks and data theft, ransomware, malware, spyware, and all the other kinds of -ware. Chances are, you’re not thinking about your thermostat. Or your electric meter. Or your garage door
US Oil and Gas Firms Woefully Exposed to Cyber Threats - Infosecurity Magazine
The US oil and gas industry is failing to keep pace with the growing threat from cyberspace, with two-thirds (68%) of organizations suffering a major security breach in the past year, according to a new study.
CyberX Discovers Operation BugDrop: A Large-Scale Cyber-Reconnaissance Operation Targeting Ukrainian Organizations - PR Newswire
CyberX has confirmed at least 70 victims successfully targeted by the operation in a range of sectors including critical infrastructure, media, and scientific research. The operation seeks to capture a range of sensitive information including audio recordings of conversations, screen shots, documents and passwords.
NATO and partner countries are sharing R&D in the development of cyber-security tools to achieve economies of scale, including the CIICS (Cyber Information and Incident Coordination System) which has just been deployed in the Alliance's 24/7 cyber operations center.
A Google researcher has uncovered what may be the most worrying web leak of 2017 so far, possibly exposing passwords, private messages and other sensitive data from a vast number of sites, including major services like Uber, FitBit and OKCupid.
A Computer’s Blinking Light Could Transmit Data - Ben-Gurion Univ
A desktop computer’s tiny blinking LED light would hardly arouse the suspicions of anyone working in an office after hours. However, that LED could be silently winking out an optical stream of the computer’s secrets to a data-stealing drone.
Researchers at the Dutch research institute CWI and Google jointly announce that they have broken the SHA-1 internet security standard in practice.
Hitachi Hackers Cashed in on Security Gaps in India’s Worst-ever Cybersecurity Breach - The Economic Times
The audit report, which was submitted to the regulator last week, brings out an uncomfortable truth that most Indian banks and corporates will now have to deal with: anti-virus and anti-malware devices they have installed are no match for targeted cyber attacks.
San Diego Installing ‘Smart City’ Network with Sensors on 3,200 Streetlights - Times of San Diego
General Electric will put cameras, microphones and sensors on 3,200 streetlights in San Diego this year, marking the first large-scale use of "smart city" tools GE says can help monitor traffic and pinpoint crime.
Data From Connected CloudPets Teddy Bears Leaked and Ransomed, Exposing Kids’ Voice Messages - Troy Hunt's Blog
Only a couple of weeks ago, there were a lot of news headlines about how Germany had banned an internet-connected doll called "Cayla" over fears hackers could target children. One of their primary concerns was the potential risk to the privacy of children.
Android users, the Mediaserver is still in the spotlight with Critical and High vulnerabilities this month. But the Media server is not the only issue at hand-in fact, this month there are eight critical flaws. Let's look at the critical flaws that are detailed in the February 2017 Android Security Bulletin.
How to Bury a Major Breach Notification - KrebsonSecurity
The RSA report detailed the threat from a malware operation the company dubbed "Kingslayer." According to RSA, the attackers compromised the Web site of a company that sells software to help Windows system administrators better parse and understand Windows event logs. RSA said the site hosting the event log management software was only compromised for two weeks - from April 9, 2015 to April 25, 2015 - but that the intrusion was likely far more severe than the short duration of the inDatatrusion suggests.
There’s a Sneaky New Google Chrome Hack That Tricks You Into Downloading a Fake ‘Font’ - Business Insider
There's a crafty new way hackers are trying to get inside your computer: By tricking you into installing a fake "missing font."
The way that Firefox caches intermediate CA certificates could open the door to the fingerprinting of users and the leaking of browsing details, a researcher warned this week.
Blockchain’s New Role In The Internet of Things - DarkReading
With next gen 'distributed consensus' algorithms that combine both security and performance, organizations can defend against DDoS attacks, even those that leverage IoT devices.
NIST has launched a beta site for a new version of CSRC.nist.gov: https://beta.csrc.nist.gov. It will be available alongside http://csrc.nist.gov for several months as we continue to fix issues, implement enhanced functionality, and migrate existing content.
GAO has consistently identified shortcomings in the federal government's approach to ensuring the security of federal information systems and cyber critical infrastructure as well as its approach to protecting the privacy of personally identifiable information (PII).
DoD is working with GitHub, an open source platform, to experiment with fostering more collaboration between private sector software developers and federal employees on software projects built within the DoD. The Code.mil URL redirects users to an online repository that will house code written for a range of projects across DoD for individuals to review and make suggested changes.
The Army, which already has 30 cyber teams at full operational capability and 11 more at initial operating capability, is aiming to have 41 fully operational teams by year’s end.
Appropriately named "Tallinn Manual 2.0: International Law Applicable to Cyber Operations," the new book offers a fascinating look at how far the cyber threat landscape has evolved in the less than half decade since the first version’s release in 2013, shifting the focus from conventional state-authorized and operated cyber warfare to the small-bore deniable cyber activities that form the majority of day-to-day cyber attacks today.
Benjamin Foulois Cyber Proving Ground - 24th Air Force
Since 2015, the 24th Air Force (24 AF) and Air Force Life Cycle Management Center (AFLCMC) have been working to establish a Cyber Proving Ground (CPG), located at Joint Base San Antonio-Lackland, Texas, in support of the 24 AF’s cyber missions and cyber weapon systems, and associated touch points of the 25 AF missions.
Cyber Security of Critical Infrastructure - Department of Homeland Security
CSIAC serves on the EO 13636/PPD-21 Research & Development (R&D) Working Group (WG) run by DHS S&T. If you would like further information, contact Dr. Paul Losiewicz at email@example.com
The Cyber COI engages in multiple activities and forums for coordinating cyber S&T strategies, sharing innovative ideas and technical approaches, promoting technology transfer and upcoming business opportunities, and in jointly planning programs across the Department of Defense and other government agencies. Membership is based upon approval by the Cyber COI group administrator.
DOD OSBP officials acknowledged that cybersecurity is an important and timely issue for small businesses -and therefore the office is considering incorporating cybersecurity into its existing outreach and education efforts. During the review, GAO identified 15 existing federal cybersecurity resources that DOD OSBP could disseminate to defense small businesses.
DHS S&T Collaboration Community - Ideascale
The National Conversation is intended to bring together everyone to play a role in shaping the future of homeland security technology. This means responders, operational users, citizens, academia, and industry.
The Department of Defense Cyber Strategy - Department of Defense
The purpose of this strategy is to guide the development of DoD's cyber forces and strengthen our cyber defense and cyber deterrence posture. It focuses on building cyber capabilities and organizations for DoD's three primary cyber missions.
The Information Sharing Environment (ISE) broadly refers to the people, projects, systems, and agencies that enable responsible information sharing for national security.
Standards & Reference Documents - CSIAC
View all Best Practices and Reference Documents on the CSIAC website.
DoD Cyber Domain Resources - Department of Defense
DHS Cyber Security Strategy (“Blueprint for a Secure Cyber Future”, 2011) - Department of Homeland Defense
DIB CS/IA Voluntary Information Sharing Program - DoD DIBNet
DoD's DIB CS/IA program is a voluntary program to enhance and supplement DIB participants' capabilities to safeguard DoD information that resides on, or transits, DIB unclassified information systems.
US-CERT Bulletins - Department of Homeland Security
Bulletins provide weekly summaries of new vulnerabilities. Patch information is provided when available.
US-CERT Alerts - Department of Homeland Security
Alerts provide timely information about current security issues, vulnerabilities, and exploits.
NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.
Trustworthy CyberSpace: Strategic Plan For The Federal Cybersecurity Research and Development Program - NITRD
Committee on National Security Systems (CNSS) - Committee on National Security Systems
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.