The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
To assist organizations’ Information Awareness training programs, the CSIAC has created a series of videos designed to introduce several fundamental IA concepts. This fast, free, and easy-to-watch video series describes current information security threats and protections for government, industry and academia. Stay tuned for the release!
This presentation will focus on gaining an understanding of the current and future trends we have observed from the Deep & Dark Web which can offer illuminating insights into how to remain in front of future threats.
Security: It’s a Big Data Problem - Data Informed
Data breaches are occurring with greater frequency than ever before and have increasingly devastating effects on everyone from small businesses to Fortune 500 companies to the federal government.
Intel CEO Talks Cloud and Internet of Things Strategy - Top Tech News
CEO Brian Krzanich outlined a set of core beliefs yesterday guiding the company's strategy for the future -- chief among them that the cloud is the single most important trend influencing the future of computing.
Keeping the World’s Lights On: The Urgent Need to Secure Critical Infrastructure from Cyber-Threat - Information Security Buzz
The world needs to wake up to the vulnerability of critical infrastructures to cyber-attack and to respond, emphatically, with Government regulation, industry-wide collaboration, education and deep, tailored protection.
Strong dependence on industrial control systems, or ICS, is a serious vulnerability for industry, the National Security Agency’s deputy director said here yesterday.
The potential dangers of USB sticks when it comes to transporting computer viruses are well known, but even workers in highly sensitive environments like nuclear facilities can't always seem to prevent themselves from exposing their PCs to malware.
The Cyber Act of War Act of 2016 that asks the administration to define whether a specific cyberattack would and would or not be considered an act of war thus enabling the United States to respond appropriately.
Carter Says Cyber Warfare on DAESH Can Set Model - TRT World
Cyber attack techniques used by the US-led coalition against DAESH could also be used by other countries, US Defense Secretary Ashton Carter.
IRS, Other Agencies Must Keep Moving To Keep Up With Data Security - Federal News Radio
The changing cyber landscape and the increasing amounts of data that need protection, creates a series of spinning plates that the federal government must constantly work to balance.
New facility will enable interactive, high-performance computing for data analysis.
IBM’s Watson is Going to Cybersecurity School - Network World
IBM Security on Tuesday announced a new year-long research project through which it will collaborate with eight universities to help train its Watson artificial-intelligence system to tackle cybercrime.
President Obama signed a bill Wednesday allowing companies to sue to defend their trade secrets.
The Energy and Commerce Committee next week will be briefed by U.S. wireless operators on a security vulnerability in the global cellphone network that experts say may have allowed other countries to eavesdrop on officials’ private conversations.
US Gov’t Probes Mobile Phone Industry Over the Sad State of Security Updates - Aars Technica UK
FCC and FTC coordinate probe of OS developers, hardware makers, and carriers.
SWIFT has told its bank customers that they are responsible for securing computers used to send messages over its global network, which was used to steal some $81 million from a Bangladesh central bank account at the New York Fed in February.
Retired U.S. Gen. Michael Hayden says it's up to the private sector to defend against most cyber-threats because the government can only deal with a "thin slice" of the incidents.
IBM Extends Open Invitation to Play With Its Quantum Computer - Tech News World
IBM last week announced that it would allow researchers and scientists to run experiments using its quantum processor.
Three advances, three steps closer to quantum's potential.
Homeland Security has warned that hackers are exploiting a security vulnerability in SAP business software -- a flaw that dates back to 2010.
Cyber Security of Critical Infrastructure - Department of Homeland Security
CSIAC serves on the EO 13636/PPD-21 Research & Development (R&D) Working Group (WG) run by DHS S&T. If you would like further information, contact Dr. Paul Losiewicz at email@example.com
The Cyber COI engages in multiple activities and forums for coordinating cyber S&T strategies, sharing innovative ideas and technical approaches, promoting technology transfer and upcoming business opportunities, and in jointly planning programs across the Department of Defense and other government agencies. Membership is based upon approval by the Cyber COI group administrator.
DOD OSBP officials acknowledged that cybersecurity is an important and timely issue for small businesses -and therefore the office is considering incorporating cybersecurity into its existing outreach and education efforts. During the review, GAO identified 15 existing federal cybersecurity resources that DOD OSBP could disseminate to defense small businesses.
DHS S&T Collaboration Community - Ideascale
The National Conversation is intended to bring together everyone to play a role in shaping the future of homeland security technology. This means responders, operational users, citizens, academia, and industry.
The Department of Defense Cyber Strategy - Department of Defense
The purpose of this strategy is to guide the development of DoD's cyber forces and strengthen our cyber defense and cyber deterrence posture. It focuses on building cyber capabilities and organizations for DoD's three primary cyber missions.
Tags: Cybersecurity Strategy
The Information Sharing Environment (ISE) broadly refers to the people, projects, systems, and agencies that enable responsible information sharing for national security.
Standards & Reference Documents - CSIAC
View all Best Practices and Reference Documents on the CSIAC website.
DoD Cyber Domain Resources - Department of Defense
DHS Cyber Security Strategy (“Blueprint for a Secure Cyber Future”, 2011) - Department of Homeland Defense
DIB CS/IA Voluntary Information Sharing Program - DoD DIBNet
DoD's DIB CS/IA program is a voluntary program to enhance and supplement DIB participants' capabilities to safeguard DoD information that resides on, or transits, DIB unclassified information systems.
US-CERT Bulletins - Department of Homeland Security
Bulletins provide weekly summaries of new vulnerabilities. Patch information is provided when available.
US-CERT Alerts - Department of Homeland Security
Alerts provide timely information about current security issues, vulnerabilities, and exploits.
NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.
Trustworthy CyberSpace: Strategic Plan For The Federal Cybersecurity Research and Development Program - NITRD
Committee on National Security Systems (CNSS) - Committee on National Security Systems
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.