The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
Cybersecurity attacks on government, healthcare, and financial institutions have been increasing at a significant rate in both frequency and sophistication. Each hacker has his own specialized skillset and personal reasons for launching a cyberattack. Hackers often seize on particular situations in an attempt to exploit potential vulnerabilities. Major recent examples include the U.S. presidential election and the COVID-19 global pandemic.
This podcast discusses some of the more common cyberattack motives as well as explore the typical attack vectors often employed by hackers.
Tags: CSIAC Podcast, Cyber Attack Vectors, Cybersecurity
In Case You Missed It: CSIAC Webinars – Defense Modeling and Simulation (M&S) Catalog: Art of the Possible - CSIAC
The Defense M&S Catalog is an OUSD (R&E) capability developed to facilitate discovery and reusability of M&S resources across the acquisition lifecycle. The Catalog provides an avenue for M&S organizations to make resources available for reuse, serves as a collection point for enterprise discovery, and actively seeks contribution of resources from M&S organizations.
This webinar will provide an overview of the current capabilities of the Defense M&S Catalog, a look “under the hood” of the Catalog into the technologies that power discovery and contribution capabilities, and a discussion of the evolution of the Catalog’s capabilities.
Tags: CSIAC, CSIAC Webinar, Defense M&S Catalog, Defense Modeling & Simulation
The goal of the DoD Cybersecurity Policy Chart is to capture the tremendous breadth of applicable policies, some of which many cybersecurity professionals may not even be aware, in a helpful organizational scheme. The use of color, fonts and hyperlinks are all designed to provide additional assistance to cybersecurity professionals navigating their way through policy issues in order to defend their networks, systems and data.
Tags: CSIAC, Cybersecurity Policy Chart
TINKER AIR FORCE BASE, Okla (AFNS) - Members of U.S. Pacific Air Forces and Japan Air Self-Defense Force visited the 552nd Air Control Networks Squadron to build cyber-defense capacity, April 4-10.
Tags: Cybersecurity, U.S. Air Force
TYNDALL AIR FORCE BASE, Fla. (AFNS) - The Air Force offered its first glimpse of a new virtual operations prototype during a live equipment demonstration at Tyndall Air Force Base, April 28.
Tags: Agile, Hybrid Cloud, Installation Resilience Operations Center (IROC), U.S. Air Force
DOD Science and Technology Executive Committee Announces Winner of FY21 Applied Research for Advancement of S&T Priorities Program Award - Department of Defense (DoD)
The Department of Defense (DoD) Science and Technology Executive Committee (S&T ExCom), coordinated by the Office of the Under Secretary for Research and Engineering (OUSD(R&E)), is proud to announce the winner of the 2021 Applied Research for Advancement of S&T Priorities (ARAP) Program Award Competition.
Tags: Applied Research for Advancement of S&T Priorities (ARAP), Department of Defense (DoD), Science and Technology Executive Committee (S&T ExCom)
WASHINGTON – In celebration of National Superhero Day, the Cybersecurity and Infrastructure Security Agency (CISA) is releasing its second graphic novel in the Resilience Series to educate the public on the dangers and risks associated with dis- and misinformation campaigns.
Tags: Cybersecurity, Cybersecurity and Infrastructure Security Agency (CISA), Disinformation, Resilience Series
WASHINGTON – Today, Secretary of Homeland Security Alejandro N. Mayorkas urged small businesses to proactively guard against the growing threat of ransomware during a virtual event hosted by the U.S. Chamber of Commerce. Video of the full event is available here.
Tags: Cybersecurity, Ransomware, U.S. Chamber of Commerce
Ethical hackers now have many more targets within the Defense Department, DOD officials announced. The department is expanding its Vulnerability Disclosure Program to include all publicly accessible DOD information systems.
Tags: Bug Bounties, Department of Defense (DoD), DoD Vulnerability Disclosure Program (VDP)
ROME, N.Y. (AFNS) - The U.S. Air and Space Forces in collaboration with the security research community opened registration May 4 for the qualification round of the second annual Space Security Challenge: Hack-A-Sat satellite hacking challenge.
Tags: AF, AFMC, AFRL, Air Force, Cyber, ethical hacking, FS, Hack-A-Sat 2, Hack-a-Sat Challenge, innovation, registration, solutions, Space Security Challenge, USAF, virtual competition
CSIAC supports several communities of practice, such as the Cyber Community of Interest (COI) Group and research & development working groups.
This list of related sites provides additional sources to pursue the topic of Cybersecurity. The sites include Government organizations, including federal agencies, Department of Defense and military service agencies, commercial organizations, and academic institutions.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.