The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
RECENT HEADLINES:
Critical Infrastructure:
Lawmakers Look To ‘Dumb Down’ Smart Grid - The Hill
Lawmakers are taking a look at legislation to improve cybersecurity in critical infrastructure by dumbing down the nation's smart grid.
Cyberwarfare:
NATO Ambassador: How The Ukraine Crisis Fits Cyber War Narrative - Dark Reading
Kenneth Geers previews his Black Hat talk and discusses the strategic military maneuvers governments can make within cyberspace.
Data Security:
IRS Unveils Data Security Initiative Aimed at Tax Preparers - Accounting Web
The IRS on July 6 rolled out its first fact sheet as part of a new public awareness campaign on data security that is aimed at tax professionals.
NHS Trusts Need To Prioritise Data Security, Says Fiona Caldicott - Computer Weekly
National data guardian Fiona Caldicott’s report on data security in the NHS recommends 10 new data security standards that will apply to all organisations holding health and care information.
154 Million Voter Records Exposed, Revealing Gun Ownership, Facebook Profiles, And More - Daily Dot
When we eventually get to look back on 2016, we might be tempted to label it “The Year of Leaking Voter Lists.”
Computer Crash Wipes Out Years of Air Force Investigation Records - Defense One
Fraud and abuse investigations dating back to 2004 vanished when a database became corrupted, service officials said.
Healthcare Security:
The Evolving Data Security Threat Facing Healthcare Organizations - Healthcare-Informatics Magazine
Noted data security expert Mac McMillan says healthcare organizations should maintain their enterprises at a high state of readiness.
High Performance Computing:
Intel to Distribute SUSE High Performance Computing Stack - Inside HPC
Today SUSE announced Intel will distribute SUSE Linux Enterprise Server for High Performance Computing as an option for the recently introduced Intel HPC Orchestrator, an Intel-supported HPC system software stack.
Internet-of-Things:
Exploiting Internet of Things Applications and Confronting the Security Risks - IFSEC Global
Companies with an Internet of Things mindset will be best positioned for growth in a world where connectivity redefines ecosystems and shatters old business models, an expert has claimed.
Mobile Security:
10 Million Android Devices Reportedly Infected With Chinese Malware - CNET
A security software maker says that Chinese cybercriminals have gained access to millions of smartphones around the world.
Private Sector:
Business Has Critical Role In Fighting Cyber Crime, Says Report - Computer Weekly
The National Crime Agency is calling for a stronger collaboration between business and law enforcement to fight cyber crime in the light of a report produced with private sector partners.
Quantum Computing:
Google’s latest experiment aims to protect against encryption-breaking quantum computers - 9to5 Google
While quantum computing is still in its infancy, it has the possibility of solving problems - like secure digital communications — dramatically faster than current technology.
Software Security:
Cerber Strikes With Office 365 Zero-Day Attacks - Dark Reading
Ransomware variant continues its success through chameleon-like reinvention.
CSIAC SUPPORTED COMMUNITIES:
Cyber Security of Critical Infrastructure - Department of Homeland Security
CSIAC serves on the EO 13636/PPD-21 Research & Development (R&D) Working Group (WG) run by DHS S&T. If you would like further information, contact Dr. Paul Losiewicz at plosiewicz@csiac.org
Cyber Community of Interest (COI) Group - CSIAC
The Cyber COI engages in multiple activities and forums for coordinating cyber S&T strategies, sharing innovative ideas and technical approaches, promoting technology transfer and upcoming business opportunities, and in jointly planning programs across the Department of Defense and other government agencies. Membership is based upon approval by the Cyber COI group administrator.
TECHNICAL RESOURCES, POLICY & GUIDANCE:
Opportunities Exist for DOD to Share Cybersecurity Resources with Small Businesses - GAO
DOD OSBP officials acknowledged that cybersecurity is an important and timely issue for small businesses -and therefore the office is considering incorporating cybersecurity into its existing outreach and education efforts. During the review, GAO identified 15 existing federal cybersecurity resources that DOD OSBP could disseminate to defense small businesses.
DHS S&T Collaboration Community - Ideascale
The National Conversation is intended to bring together everyone to play a role in shaping the future of homeland security technology. This means responders, operational users, citizens, academia, and industry.
Information Sharing Environment - ISE
The Information Sharing Environment (ISE) broadly refers to the people, projects, systems, and agencies that enable responsible information sharing for national security.
Standards & Reference Documents - CSIAC
View all Best Practices and Reference Documents on the CSIAC website.
The DoD Cybersecurity Policy Chart (Formerly the IA Policy Chart) - CSIAC
DoD Cyber Domain Resources - Department of Defense
DHS Cyber Security Strategy (“Blueprint for a Secure Cyber Future”, 2011) - Department of Homeland Defense
DIB CS/IA Voluntary Information Sharing Program - DoD DIBNet
DoD's DIB CS/IA program is a voluntary program to enhance and supplement DIB participants' capabilities to safeguard DoD information that resides on, or transits, DIB unclassified information systems.
US-CERT Bulletins - Department of Homeland Security
Bulletins provide weekly summaries of new vulnerabilities. Patch information is provided when available.
US-CERT Alerts - Department of Homeland Security
Alerts provide timely information about current security issues, vulnerabilities, and exploits.
National Vulnerability Database - NIST
NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.
Trustworthy CyberSpace: Strategic Plan For The Federal Cybersecurity Research and Development Program - NITRD
Committee on National Security Systems (CNSS) - Committee on National Security Systems
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.
Leave a Comment
You must be logged in to post a comment.