The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
Join CSIAC Tuesday, January 26 from 1100 to 1200 EST for a webinar presentation titled, "Agile Condor: Supercomputing at the Edge for Intelligent Analytics." Please register in advance at: https://www.anymeeting.com/PIID=EF59DF86894D3E
The Air Force Research Laboratory has developed Agile Condor, a flexible airborne testbed used to demonstrate and validate advanced high-performance computing hardware and software configurations. This webinar will discuss Agile Condor's successful demonstration of state-of-the-art machine learning (ML) software. The embedded ML software algorithms successfully implemented "supercomputing at the edge" through the detection and classification of several ground-based objects and signals.
“Own Your Privacy” Twitter Chat - National Cyber Security Alliance
Join the conversation as the National Cyber Security Alliance hosts a Twitter chat on Jan. 21 at 1400 EST to discuss privacy best practices and resources for individuals.
“Respecting Consumer Privacy” Twitter Chat - National Cyber Security Alliance
Have data privacy knowledge and resources for businesses? Share your expertise during the National Cyber Security Alliance Privacy-themed Twitter chat on Jan. 25 at 1400 EST to celebrate Data Privacy Day!
Air Force acquisition executive unveils next e-Plane, publishes digital engineering guidebook - Air Force
ARLINGTON, Va. (AFNS) -- In a follow-on to his Matrix-themed There is No Spoon treatise, Dr. William Roper, assistant secretary of the Air Force for acquisition, technology and logistics, released a sequel essay that establishes criteria for digitally-engineered programs, while revealing Next Generation Air Dominance has achieved e-Series status as the service s next e-Plane.
Tags: Air Force, e-Plane, USAF
Amir of Qatar Hosts Discussion with Acting Secretary Wolf Addressing 21st Century Security Solutions; Wolf Also Signs Memorandum of Border Security Cooperation with Qatari Prime Minister - DHS
Today, Acting DHS Secretary Chad F. Wolf met with His Highness (H.H.) Amir of Qatar Sheikh Tamim bin Hamad Al Thani and His Excellency (H.E.) Qatari Prime Minister, and the Minister of Interior, Sheikh Khalid bin Khalifa bin Abdulaziz Al Thani, to discuss 21st century regional solutions addressing aviation security, customs and border protection, Qatari security in their hosting of World Cup 2022, and overall critical infrastructure and cybersecurity opportunities to enhance safety and security.
Tags: Border Security, Critical Infrastructure Security, Homeland Security Enterprise, International Engagement, Secretary of Homeland Security
WASHINGTON (AFNS) -- The Secretary of the Air Force, on behalf of the Office of Secretary of Defense, selected Redstone Arsenal, Huntsville, Alabama, as the preferred location for the U.S. Space Command Headquarters.
Tags: AFWN, Air Force, SecAF, U.S. Space Command, USAF, USSPACECOM
WASHINGTON On January 11, then-Acting Secretary of Homeland Security Chad F. Wolf approved a Strategic Action Plan that details DHS s efforts to confront the full spectrum of Chinese threats to the Homeland. The DHS Strategic Action Plan to Counter the Threat Posed by the People s Republic of China (PRC), available here, describes how the Department will continue to leverage the entire Homeland Security Enterprise to respond to the myriad threats posed by the Beijing regime to the American people.
Tags: Border Security, Cybersecurity, Secretary of Homeland Security
CSIAC supports several communities of practice, such as the Cyber Community of Interest (COI) Group and research & development working groups.
This list of related sites provides additional sources to pursue the topic of Cybersecurity. The sites include Government organizations, including federal agencies, Department of Defense and military service agencies, commercial organizations, and academic institutions.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.