The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
Embedded devices are increasingly connected to network resources for additional functionality with the ultimate goal of greater mission capability. Recently, security of connected devices is being scrutinized with highly publicized vulnerabilities of various consumer devices. While several domains are starting to publish new guidelines for cybersecurity there is not a standardized risk assessment framework for organizations to utilize. Furthermore, many domains have not published any cybersecurity guidelines at all. This webinar will talk about some of the industry guidelines that exist, how they are related, which ones need to be created, and how an assessment framework can be created that is standards based for consistent risk assessment results.
The targets included the Wolf Creek nuclear facility in Kansas, according to several reports. An urgent Department of Homeland Security (DHS) report indicated a foreign power, possibly Russia, was responsible, the New York Times said. The DHS document carried the second-highest threat rating, the Times said.
The U.S government warned industrial firms this week about a hacking campaign targeting the nuclear and energy sectors, the latest event to highlight the power industry's vulnerability to cyber attacks.
Security researchers confirmed on Monday that a vicious new cyberattack has compromised the computer systems of over 1,000 organizations in 84 countries. Dubbed "Energetic Bear," the Stuxnet-like malware is largely targeting energy and utility companies. It's almost certainly from Russia.
A new cyber virus spread from Ukraine to wreak havoc around the globe on Wednesday, crippling thousands of computers, disrupting ports from Mumbai to Los Angeles and halting production at a chocolate factory in Australia.
The sixth annual Cyber Guard exercise, co-led by Cybercom, the Department of Homeland Security and the FBI, wrapped up with the tone set by the Cybercom commander in his June 12 opening remarks. "I will accept failure in a training environment if it generates knowledge and insight that makes us better," said Navy Adm. Michael S. Rogers, who also serves as director of the National Security Agency and Central Security Service. "What I constantly tell the team leads is it's about pushing the envelope. It's about challenging your teams, and it's about trying different things."
The Defense Information Systems Agency (DISA), which manages the Pentagon’s email systems, says it intends to adopt, by default, STARTTLS, an encryption protocol designed to prevent the interception of email messages in transit. "DISA is actively working an acquisition to upgrade the email gateways that will allow us to take advantage of evolving capabilities for email protection," wrote Maj. Gen. Sarah Zabel, vice director of DISA, in a letter this week addressed to Senator Ron Wyden, Democrat of Oregon.
In the wake of recent devastating global ransomware outbreaks, Microsoft has finally realized that its Windows operating system is deadly vulnerable to ransomware and other emerging threats that specifically targets its platform. To tackle this serious issue, the tech giant has introduced a new anti-ransomware feature in its latest Windows 10 Insider Preview Build (16232) yesterday evening, along with several other security features. Microsoft is planning to introduce these security features in Windows 10 Creator Update (also known as RedStone 3), which is expected to release sometime between September and October 2017.
Global shipping is still feeling the effects of a cyber attack that hit A.P. Moller-Maersk two days ago, showing the scale of the damage a computer virus can unleash on the technology dependent and inter-connected industry.
Machine learning (ML) may well be The Next Big Thing, but it has yet to register in mainstream enterprise adoption. While breathless prognosticators proclaim 50% of organisations lining up to magically transform themselves in 2017 with ML, more canny observers put the number closer to 15%. And that's being generous.
"Today we can finally reopen our key applications," Maersk said in a statement on Monday. The company, which handles one in seven containers shipped globally, said it expects to have all its 1500 applications fully functional within a week. Maersk said on Friday it expected client-facing operations to return to normal by Monday and was resuming container deliveries at its major ports. Maersk's port operator APM Terminals said on Sunday all terminals had resumed operations and said it would continue to increase productivity and available services. The Maasvlakte II terminal in Rotterdam would be able to make import deliveries starting Monday, it said.
Ukraine said on Saturday that Russian security services were involved in a recent cyber attack on the country, with the aim of destroying important data and spreading panic. The SBU, Ukraine's state security service, said the attack, which started in Ukraine and spread around the world on Tuesday, was by the same hackers who attacked the Ukrainian power grid in December 2016. Ukrainian politicians were quick to blame Russia for Tuesday's attack, but a Kremlin spokesman dismissed "unfounded blanket accusations". Cyber security firms are trying to piece together who was behind the computer worm, dubbed NotPetya by some experts, which conked out computers, hit banks, disrupted shipping and shut down a chocolate factory in Australia.
U.S. Military Sees Future in Neuromorphic Computing - TheNextPlatform
"The scalable platform IBM is building for AFRL will feature an end-to-end software ecosystem designed to enable deep neural-network learning and information discovery. The 64-chip array's advanced pattern recognition and sensory processing power will be the equivalent of 64 million neurons and 16 billion synapses, while the processor component will consume the energy equivalent of a dim light bulb - a mere 10 watts to power."
Instead of creating quantum computers based on qubits that can each adopt only two possible options, scientists have now developed a microchip that can generate "qudits" that can each assume 10 or more states, potentially opening up a new way to creating incredibly powerful quantum computers, a new study finds.
Quantum Computers Compete for “Supremacy” - Scientific American
Scientists have long dreamed of developing quantum computers, machines that rely on arcane laws of physics to perform tasks far beyond the capability of today’s strongest supercomputers. In theory such a machine could create mathematical models too complex for standard computers, vastly extending the range and accuracy of weather forecasts and financial market predictions, among other things. They could simulate physical processes such as photosynthesis, opening new frontiers in green energy. Quantum computing could also jolt artificial intelligence to a vastly higher level of sophistication: If IBM’s Watson can already win at Jeopardy! and make some medical diagnoses, imagine what an enormously smarter version could do.
USC to Lead IARPA Quantum Computing Project - Newswise
Intelligence Advanced Research Projects Activity (IARPA) has selected the University of Southern California to lead a consortium of universities and private companies to build quantum computers that are at least 10,000 times faster than the best state-of-the-art classical computers.
OpenBSD Will Get Unique Kernels on Each Reboot. Do You Hear That Linux, Windows? - Bleeping Computer
A new feature added in test snapshots for OpenBSD releases will create a unique kernel every time an OpenBSD user reboots or upgrades their computer.
Researchers at Fox‑IT have managed to wirelessly extract secret AES-256 encryption keys from a distance of one metre (3.3 feet) – using €200 (~US$224) worth of parts obtained from a standard electronics store – just by measuring electromagnetic radiation. At that distance sniffing the keys over the air took five minutes, but if an attacker got within 30 centimetres (11.8 inches) of a device, the extraction time is cut down to just 50 seconds.
The best work of hackers tends to remain invisible. But when sophisticated intruders broke into the computer networks of regional energy firms in Ukraine in 2015 and cut power to roughly a quarter million people, their tampering didn't go unnoticed. In this rare instance, the staff of one of those electric utilities managed to capture the hackers' handiwork on video.
To help the National Cybersecurity Center of Excellence (NCCoE) address industry's needs most efficiently, the National Institute of Standards and Technology (NIST) today announced its intention to sponsor its first Federally Funded Research and Development Center (FFRDC).
Cyber Security of Critical Infrastructure - Department of Homeland Security
CSIAC serves on the EO 13636/PPD-21 Research & Development (R&D) Working Group (WG) run by DHS S&T. If you would like further information, contact Dr. Paul Losiewicz at email@example.com
The Cyber COI engages in multiple activities and forums for coordinating cyber S&T strategies, sharing innovative ideas and technical approaches, promoting technology transfer and upcoming business opportunities, and in jointly planning programs across the Department of Defense and other government agencies. Membership is based upon approval by the Cyber COI group administrator.
DOD OSBP officials acknowledged that cybersecurity is an important and timely issue for small businesses -and therefore the office is considering incorporating cybersecurity into its existing outreach and education efforts. During the review, GAO identified 15 existing federal cybersecurity resources that DOD OSBP could disseminate to defense small businesses.
DHS S&T Collaboration Community - Ideascale
The National Conversation is intended to bring together everyone to play a role in shaping the future of homeland security technology. This means responders, operational users, citizens, academia, and industry.
The Department of Defense Cyber Strategy - Department of Defense
The purpose of this strategy is to guide the development of DoD's cyber forces and strengthen our cyber defense and cyber deterrence posture. It focuses on building cyber capabilities and organizations for DoD's three primary cyber missions.
The Information Sharing Environment (ISE) broadly refers to the people, projects, systems, and agencies that enable responsible information sharing for national security.
Standards & Reference Documents - CSIAC
View all Best Practices and Reference Documents on the CSIAC website.
DoD Cyber Domain Resources - Department of Defense
DHS Cyber Security Strategy (“Blueprint for a Secure Cyber Future”, 2011) - Department of Homeland Defense
DIB CS/IA Voluntary Information Sharing Program - DoD DIBNet
DoD's DIB CS/IA program is a voluntary program to enhance and supplement DIB participants' capabilities to safeguard DoD information that resides on, or transits, DIB unclassified information systems.
US-CERT Bulletins - Department of Homeland Security
Bulletins provide weekly summaries of new vulnerabilities. Patch information is provided when available.
US-CERT Alerts - Department of Homeland Security
Alerts provide timely information about current security issues, vulnerabilities, and exploits.
NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.
Trustworthy CyberSpace: Strategic Plan For The Federal Cybersecurity Research and Development Program - NITRD
Committee on National Security Systems (CNSS) - Committee on National Security Systems
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.