The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
CSIAC ANNOUNCEMENTS:
DoDIAC Webinar, Tuesday, August 25 @ 1200 EDT: Big Data and Big Implications for Bio-cybersecurity - CSIAC
Join CSIAC and the Homeland Defense and Security Information Analysis Center (HDIAC) on Tuesday, August 25th, at 1200 EDT for a combined webinar presentation titled "Big Data and Big Implications for Bio-cybersecurity." Please register in advance for the webinar at: https://www.anymeeting.com/PIID=EF53DD87844A31.
In this webinar, Professor James Giordano of Georgetown University describes the uses and value of big data and cyber-capabilities in bioscience and biotechnology; addresses the national security, intelligence, and defense applications of these tools and methods; illustrates vulnerabilities in these systems' infrastructures and functions, and posits the importance and necessity of bio-cybersecurity as a multi-organizational posture and enterprise.
New CSIAC Podcast – Rust Programming Language: Addressing Software Development and Program Security Shortfalls - CSIAC
During this roundtable discussion, Dr. James Fawcett describes different conceptual models that underlie the Rust programming language. Exemplars are used to illustrate how the models describe aspects of the language for effective use. In this podcast, five core fundamental models are presented: Type Safety; Ownership; Object Model; Generics and Code Structure.
RECENT HEADLINES:
CISA Releases Document Suite Exploring the Value of Federated ICAM in Different Public Safety Scenarios - CISA
Today, CISA released the Identity, Credential, and Access Management (ICAM) Value Proposition Suite of documents in collaboration with SAFECOM and the National Council of Statewide Interoperability Coordinators (NCSWIC), Office of the Director of National Intelligence (ODNI), and Georgia Tech Research Institute (GTRI). This suite of five (5) documents introduces ICAM concepts, explores federated ICAM use-cases, and highlights the potential benefits for the public safety community.
Tags: Cybersecurity
NSA’s La’Naia Jones Recognized As ‘Technology All-Star’ - NSA
Women of Color Magazine recently selected La Naia Jones as a national 2020 Technology All-Star in honor of her leadership and impact in the U.S. Intelligence Community (IC). Ms. Jones who joined NSA in 2002, served in many technical and leadership positions, and deployed to multiple hostile areas is currently serving as Acting Chief Information Officer (CIO) at the Office of the Director of National Intelligence (ODNI).
Tags: Intelligence Community, National Security Agency (NSA), ODNI, women in the IC
Interagency Issues Advisory On Use Of Technology To Detect And Mitigate Unmanned Aircraft Systems - DHS
Today, the Department of Justice (DOJ), the Federal Aviation Administration (FAA), the Department of Homeland Security (DHS), and the Federal Communications Commission (FCC) issued an advisory guidance document to help non-federal public and private entities better understand the federal laws and regulations that may apply to the use of capabilities to detect and mitigate threats posed by Unmanned Aircraft Systems (UAS) operations.
Tags: Homeland Security Enterprise
Army Reserve Cyber Soldiers leverage civilian skills during COVID-19 - Army.mil
COVID-19 has transformed how Army Reserve units train throughout the country. For the U.S. Army Reserve's Cyber Protection Team 185, the pandemic has allowed them to employ their civilian experience to enhance their training during virtual battle assemblies.
Tags: COVID-19
CISA Hosts Seventh Cyber Storm Exercise with Government, Industry and International Partners - CISA
The Cybersecurity and Infrastructure Security Agency (CISA) was joined this week by government, industry and international partners for Cyber Storm VII, a national cyber exercise designed to simulate response to a cyber crisis impacting the nation s critical infrastructure. The exercise assesses cybersecurity preparedness and examines incident response processes, procedures, and information sharing. It provides a venue for players to simulate the discovery of and response to a widespread coordinated cyberattack without the consequences of a real-world event. With approximately 2,000 participants over the course of three days, Cyber Storm is the nation s most extensive cybersecurity exercise series.
Tags: Cybersecurity
Army Researchers Earn Patent for Secure Communications Invention - Army
Army researchers have been awarded a patent for inventing a practical method for Army wireless devices to covertly authenticate and communicate.
Tags: Authenticate, Communication, Wireless devices
Joint NSA and FBI Cybersecurity Advisory Discloses Russian Malware Drovorub - US-CERT
The National Security Agency (NSA) and the Federal Bureau of Investigation (FBI) have released a cybersecurity advisory introducing previously undisclosed Russian malware. NSA and the FBI attributed the malware, dubbed Drovorub, to Russian advanced persistent threat (APT) actors.
Tags: Drovorub, Russian Malware
Statement from CISA Director Krebs on Today s ODNI Update - CISA
Cybersecurity and Infrastructure Security Agency (CISA) Director Christopher Krebs released the following statement today on the Office of the Director of National Intelligence's update on election threats.
Tags: Election Security
CSIAC Supported Communities
CSIAC supports several communities of practice, such as the Cyber Community of Interest (COI) Group and research & development working groups.
Technical Resources, Policy and Guidance
This list of related sites provides additional sources to pursue the topic of Cybersecurity. The sites include Government organizations, including federal agencies, Department of Defense and military service agencies, commercial organizations, and academic institutions.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.
Leave a Comment
You must be logged in to post a comment.