The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
Free CSIAC Publications - CSIAC
Free hardcopy publications available at the CSIAC store!
This presentation will provide valuable lessons learned by examining both the mistakes and successes in managing and accomplishing "impossible" projects.
Africa’s Momentous Cloud Service Launched - CAJ News Africa
SAP Africa, in partnership with Dimension Data,have launched the SAP HANA Enterprise Cloud (HEC) service to meet the growing demand for locally hosted cloud services in South Africa.
Flaws Found in Accuenergy, Ecava ICS Products - Security Week
ICS-CERT has published advisories detailing several vulnerabilities in ICS products from Accuenergy, Ecava and Sierra Wireless, including issues that have been rated “high severity.”
A New ParaDIME for Energy-efficient Computing - Science Node
The Information Computing and Technology sector uses a large chunk of the Earth's energy. The European ParaDIME project has been working to reduce the energy consumption of data centers.
Finnish Defense Ministry Hit by DDoS Cyber Attack - Defense News
Finland’s Ministry of Defence (MoD) is reviewing its IT security infrastructure in the wake of a distributed denial of service (DDoS) attack on its main website.
Microsoft Sues DOJ Over User Data - USA Today
Microsoft has sued the Justice Department in a fresh effort to prevent the government from rifling through users' personal emails or documents without their knowledge.
Meeting Cybersecurity Challenges Through Gamification - Tech Crunch
When it comes to cybersecurity issues, we always seem to be dealing with either shortages or excess.
Doctors’ Mobile Devices Putting Patient At Risk - Dark Reading
Three-fourths of physicians use more than one mobile device for work, a new study shows.
CBS Sports may have exposed more than just your busted March Madness bracket.
U.S. federal, state and local government agencies rank in last place in cyber security when compared against 17 major private industries, including transportation, retail and healthcare, according to a new report released Thursday.
Diamonds May Be Quantum Computing’s Best Friend - Computer World
It's all about maintaining that crazy little thing called superposition.
What Strategies can companies adopt to keep up with, and deal with, the huge volume of software updates they face?
The U.S. should embrace cybersecurity treaties, a former State Department official says.
Automated Information Sharing (AIS) will connect participating organizations to allow bidirectional sharing of cyber threat indicators, as well as the sharing of threat indicators partners have observed in their own networks.
China Hacked F-22, F-35 Stealth Jet Secrets - Free Beacon
Chinese national pleads guilty in California to hacking Boeing C-17 data.
Security pros consider the NIST framework an industry best practice, yet half of its adopters say its complete implementation involves a high level of investment.
FBI Warns of Cyber Threat to Electric Grid - Fox News
Three months after a Department of Homeland Security intelligence report downplayed the threat of a cyber attack against the U.S. electrical grid, DHS and the FBI began a nationwide program warning of the dangers faced by U.S. utilities from damaging cyber attacks like the recent hacking against Ukraine’s power grid.
Cyber Security of Critical Infrastructure - Department of Homeland Security
CSIAC serves on the EO 13636/PPD-21 Research & Development (R&D) Working Group (WG) run by DHS S&T. If you would like further information, contact Dr. Paul Losiewicz at firstname.lastname@example.org
The Cyber COI engages in multiple activities and forums for coordinating cyber S&T strategies, sharing innovative ideas and technical approaches, promoting technology transfer and upcoming business opportunities, and in jointly planning programs across the Department of Defense and other government agencies. Membership is based upon approval by the Cyber COI group administrator.
DOD OSBP officials acknowledged that cybersecurity is an important and timely issue for small businesses -and therefore the office is considering incorporating cybersecurity into its existing outreach and education efforts. During the review, GAO identified 15 existing federal cybersecurity resources that DOD OSBP could disseminate to defense small businesses.
DHS S&T Collaboration Community - Ideascale
The National Conversation is intended to bring together everyone to play a role in shaping the future of homeland security technology. This means responders, operational users, citizens, academia, and industry.
The Department of Defense Cyber Strategy - Department of Defense
The purpose of this strategy is to guide the development of DoD's cyber forces and strengthen our cyber defense and cyber deterrence posture. It focuses on building cyber capabilities and organizations for DoD's three primary cyber missions.
The Information Sharing Environment (ISE) broadly refers to the people, projects, systems, and agencies that enable responsible information sharing for national security.
Standards & Reference Documents - CSIAC
View all Best Practices and Reference Documents on the CSIAC website.
DoD Cyber Domain Resources - Department of Defense
DHS Cyber Security Strategy (“Blueprint for a Secure Cyber Future”, 2011) - Department of Homeland Defense
DIB CS/IA Voluntary Information Sharing Program - DoD DIBNet
DoD's DIB CS/IA program is a voluntary program to enhance and supplement DIB participants' capabilities to safeguard DoD information that resides on, or transits, DIB unclassified information systems.
US-CERT Bulletins - Department of Homeland Security
Bulletins provide weekly summaries of new vulnerabilities. Patch information is provided when available.
US-CERT Alerts - Department of Homeland Security
Alerts provide timely information about current security issues, vulnerabilities, and exploits.
NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.
Trustworthy CyberSpace: Strategic Plan For The Federal Cybersecurity Research and Development Program - NITRD
Committee on National Security Systems (CNSS) - Committee on National Security Systems
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.