The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
Upcoming CSIAC Webinar – DevSecOps Pipeline for Complex Software-Intensive Systems: Addressing Cybersecurity Challenges - CSIAC
Join CSIAC on Wednesday, June 16, 1300 – 1400 EDT, for a webinar titled, “DevSecOps Pipeline for Complex Software-Intensive Systems: Addressing Cybersecurity Challenges.” Please register in advance for the webinar at: https://www.anymeeting.com/PIID=E056DB88844F3C.
A major challenge for cybersecurity comes from new technology approaches that focus primarily on the benefits of implementation rather than on defining the governance and risk management changes necessary to establish and enforce appropriate protections. This challenge is especially important for the adoption of technology that impacts critical infrastructure and shared services, such as voting and defense. Researchers examined the challenges and the effective cybersecurity options facing Department of Defense (DoD) programs delivering cyber-physical systems and adopting DevSecOps. These researchers found a lack of broad understanding about the level of management and governance responsibility needed to define and use the DevSecOps pipeline.
Tags: CSIAC, CSIAC Webinar, Cybersecurity, DevSecOps
For decades, adversaries of the United States have attempted to hack into DoD network systems. The main adversaries in alphabetical order are China, Iran, North Korea and Russia. These countries are constantly trying to steal sensitive military secrets and gain economic advantage over the United States and other nations. If access to a network is accomplished, malware is installed and valuable information is forwarded to the hackers. The following organizations: Cybersecurity and Infrastructure Security Agency (CISA), the FBI, and the DoD have recently discovered a malware called TAIDOOR linked to the Chinese government.
Tags: CSIAC, CSIAC Podcast, Malware, TAIDOOR
The latest Cybersecurity Policy Chart can be found on the CSIAC website at:
A summary of the updates can be viewed here:
Tags: CSIAC, Cybersecurity Policy Chart
CISA – Statement on Spearphishing Campaign Targeting Government Organizations, IGOs, and NGOs - CISA
WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) has released the following statement regarding a spearphishing campaign targeting government organizations, intergovernmental organizations (IGOs), and non-governmental organizations (NGOs):
“CISA and the FBI are engaged in addressing malicious activity by a cyber threat actor that leveraged an account hosted by a third-party email service to send malicious emails to approximately 350 organizations, including federal agencies and NGOs. At this point CISA has not identified significant impact on federal government agencies resulting from these activities. CISA continues to work with the FBI to understand the scope of these activities and assist potentially impacted entities. While many organizations have controls in place to block malicious emails and prevent associated impacts, we encourage all organizations to review our Activity Alert and take steps to reduce their exposure to these types of threats.”
Tags: CISA Alert, Cybersecurity, Cybersecurity and Infrastructure Security Agency (CISA), Spearphishing
BLUE: The Quantum Frontier - Air Force
In the race to master and harness advanced technology, the Air Force is making strides within quantum research, bringing “Q-Day” to fruition sooner. Q-Day, or the day all Airmen have access to quantum technology, is the ultimate goal. The Air Force Research Laboratory is leading the way into the quantum frontier.
Tags: Air Force Research Laboratory (AFRL), Quantum Computing, U.S. Air Force
Program seeks to develop natural language processing technologies capable of interpreting cross-cultural communication, norms to assist DoD operations abroad.
The Department of Defense (DoD) is one of many government agencies that operates globally and is in constant contact with diverse cultures. Communicative understanding, not simply of local languages but also of social customs and cultural backgrounds, lies at the heart of Civil Affairs and Military Information Support Operations activities. These collectively comprise a vast majority of U.S. counterinsurgency and stabilization efforts. Within these activities, cross-cultural miscommunication can derail negotiations, incite hostile discourse – even lead to war. The likelihood of communicative failure increases dramatically where significant social, cultural, or ideological differences exist.
Tags: Artificial Intelligence (AI), Natural Language Processing (NLP)
AMC tankers test communications systems, strategic deterrence capabilities during Mobility Guardian 21 - Air Force
Airmen and tankers from across Air Mobility Command participated in exercise Mobility Guardian 2021 to test cutting-edge tactics and concepts at Oscoda-Wurtsmith Airport, May 15-27.
Aircrew and mission planners operating KC-135 Stratotankers, KC-10 Extenders and the KC-46 Pegasus came together for AMC’s premier readiness exercise to test specialized computers and communication systems that enable rapid data sharing as a means of ensuring strategic deterrence.
Tags: Communication, Data Sharing, U.S. Air Force
Today, the Department of Homeland Security s Transportation Security Administration (TSA) announced a Security Directive that will enable the Department to better identify, protect against, and respond to threats to critical companies in the pipeline sector.
Tags: Critical Infrastructure Security, Cybersecurity, Resilience, Secretary of Homeland Security
Twenty years after the Sept. 11, 2001, attacks, the great threat to the nation has evolved into cyberspace a new strategic environment where cyber actors can increase their power, degrade the power of others, and gain a strategic advantage, said Army Gen. Paul M. Nakasone.
Tags: Cybersecurity, Department of Defense (DoD)
From the battlefield to the back office, artificial intelligence has the potential to transform how the Defense Department does business in areas like increasing the speed of decision making, making sense of complex data sets and improving efficiency in back-office operations. Ensuring that AI is developed, procured and used responsibly and ethically is a top priority for the department's top leader.
Tags: Artificial Intelligence (AI), Department of Defense (DoD)
CSIAC supports several communities of practice, such as the Cyber Community of Interest (COI) Group and research & development working groups.
This list of related sites provides additional sources to pursue the topic of Cybersecurity. The sites include Government organizations, including federal agencies, Department of Defense and military service agencies, commercial organizations, and academic institutions.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.