The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
RECENT HEADLINES:
Cloud Computing:
Security In The Cognitive Era: How To Prevent Corporate Data Breaches - Forbes
There’s been no shortage of companies in the news for data leaks in the past decade as a result of hacking, inside jobs, poor security and other reason.
FEEDBACK FROM PREVIOUS DIGEST:
Critical Infrastructure:
Cyber Attack Only a Matter of Time – NSA Security Chief - Tru News
The U.S. National Security Agency chief said on Tuesday it was a "matter of when, not if" a foreign nation-state attempts to launch a cyber attack on the U.S. critical infrastructure, citing the recent hack on Ukraine's power grid as a cause for concern.
Hackers Caused Mass Blackout in Ukraine, US Officials Say - ABC News
U.S. government cyber security experts officially declared that hackers are to blame for a power outage in Ukraine that affected nearly a quarter million people in the latest significant attack on vulnerable "critical infrastructure."
Bank of England to Work with New Cybersecurity Body - BBC
The first task of Britain's new cybersecurity centre will be to work with the Bank of England, the government has announced.
Our Critical Infrastructure is too Vulnerable to Cyberattacks - The Hill
Last week, Sen. Charles Schumer (D-N.Y.) confirmed that, two years ago, the Bowman Avenue Dam in Rye Brook, New York was accessed remotely by Iranian hackers – a move characterized as “shot across our bow” and a clear indication of the tremendous risk that cyber attackers pose.
RECENT HEADLINES:
Cyberwarfare:
China Continuing Cyber Attacks on U.S. Networks - Washington Free Beacon
Cybercom says foreign governments using hacker groups to hide cyber attack origins.
The Baltic Elves Taking on Pro-Russian Trolls - The Daily Beast
What at first looked like as a social media grudge match could be a precursor to invasion, war, and resistance in the Baltics.
Data Security:
Segment and Segregate to Defend Data from Cyber Attack in 2016, Urges F-Secure - Computer Weekly
Attackers will focus on critical data in 2016, mainly with the motive of cyber extortion, according to the latest threat report from F-Secure.
High Performance Computing:
Wrangler Supercomputer Speeds Through Big Data - Eurek Alert
Data-intensive supercomputer brings new users to high performance computing for science.
Internet-of-Things:
Google says “Orchestration” is Next Big Trend in the Internet of Things - Dallas Business Journal
The Internet of Things has officially advanced past the "hype" stage, according to conference panelists including a Google developer.
Legislation and Regulation:
Senate Intel Encryption Bill Could Come Next Week - The Hill
The chairman of the Senate Intelligence Committee says a bill to give law enforcement access to encrypted data could come as early as next week.
FEEDBACK FROM PREVIOUS DIGEST:
Mobile Security:
Here’s Why the FBI Can’t Hack an iPhone Without Apple’s Help - Tech Insider
In case you haven't heard, Apple announced Tuesday that it's refusing to write code for the FBI that would unlock one of the San Bernardino shooters' iPhones.
Apple Engineers Could Quit Over iPhone Encryption Case - Information Week
Several Apple engineers have told the New York Times that they'd consider leaving one of the industry's most prized companies and positions rather than be made to create a so-called GovtOS to crack the iPhone's encryption technology.
RECENT HEADLINES:
Neuromorphic Computing:
Configurable Analog Chip Computes with 1,000 Times Less Power Than Digital - phys.org
Researchers have built and demonstrated a novel configurable computing device that uses a thousand times less electrical power – and can be built up to a hundred times smaller – than comparable digital floating-gate configurable devices currently in use.
Private Sector:
Private Sector Buy-In Critical to Cybersecurity Commission Success - FierceGovernmentIT
The success of the President's Commission for Enhancing National Cybersecurity depends heavily on buy-in and advocacy from the private sector, agency officials explained at a New America cybersecurity conference in Washington, D.C., last Wednesday.
US Army Cyber Command Spurs Collaboration with Industry, Academia - Army.mil
U.S. Army Cyber Command and Second Army is kicking off new initiatives to help realize the Secretary of Defense's vision for greater collaboration between DOD and Silicon Valley.
Public Sector:
Sharing Real-Time Cyber Threats Part of Year-Long DHS Effort - Federal News Radio
Private sector organizations receive liability protection when they share cyber threat indicators with DHS, and share information with other agencies (including CYBERCOM) in near real-time.
Sean McAfee to Run DHS Cyber Outpost in Silicon Valley - FedScoop
The person responsible for the government's Heartbleed response will pioneer DHS's outreach in Silicon Valley.
Enhance Shared Situational Awareness - Homeland Security
The vision of the Enhance Shared Situational Awareness (ESSA) Initiative is to create real-time cybersecurity situational awareness, to enable integrated operational actions, and to improve the security of the U.S. Government and U.S. critical infrastructure.
Software Security:
The FBI Warns That Car Hacking Is a Real Risk - Wired
In a public service announcement issued together with the Department of Transportation and the National Highway Traffic and Safety Administration, the FBI on Thursday released a warning to drivers about the threat of over-the-internet attacks on cars and trucks.
FEEDBACK FROM PREVIOUS DIGEST:
Most Popular:
Why Typing “.om” Instead of “.com” Could Threaten Your Privacy - CBS News
Making a typo while punching in the addresses of popular websites could lead to major headache for technology users.
CSIAC SUPPORTED COMMUNITIES:
Cyber Security of Critical Infrastructure - Department of Homeland Security
CSIAC serves on the EO 13636/PPD-21 Research & Development (R&D) Working Group (WG) run by DHS S&T. If you would like further information, contact Dr. Paul Losiewicz at plosiewicz@csiac.org
Cyber Community of Interest (COI) Group - CSIAC
The Cyber COI engages in multiple activities and forums for coordinating cyber S&T strategies, sharing innovative ideas and technical approaches, promoting technology transfer and upcoming business opportunities, and in jointly planning programs across the Department of Defense and other government agencies. Membership is based upon approval by the Cyber COI group administrator.
TECHNICAL RESOURCES, POLICY & GUIDANCE:
Opportunities Exist for DOD to Share Cybersecurity Resources with Small Businesses - GAO
DOD OSBP officials acknowledged that cybersecurity is an important and timely issue for small businesses -and therefore the office is considering incorporating cybersecurity into its existing outreach and education efforts. During the review, GAO identified 15 existing federal cybersecurity resources that DOD OSBP could disseminate to defense small businesses.
DHS S&T Collaboration Community - Ideascale
The National Conversation is intended to bring together everyone to play a role in shaping the future of homeland security technology. This means responders, operational users, citizens, academia, and industry.
The Department of Defense Cyber Strategy - Department of Defense
The purpose of this strategy is to guide the development of DoD's cyber forces and strengthen our cyber defense and cyber deterrence posture. It focuses on building cyber capabilities and organizations for DoD's three primary cyber missions.
Tags: Cybersecurity Strategy
Information Sharing Environment - ISE
The Information Sharing Environment (ISE) broadly refers to the people, projects, systems, and agencies that enable responsible information sharing for national security.
Standards & Reference Documents - CSIAC
View all Best Practices and Reference Documents on the CSIAC website.
The DoD Cybersecurity Policy Chart (Formerly the IA Policy Chart) - CSIAC
DoD Cyber Domain Resources - Department of Defense
DHS Cyber Security Strategy (“Blueprint for a Secure Cyber Future”, 2011) - Department of Homeland Defense
DIB CS/IA Voluntary Information Sharing Program - DoD DIBNet
DoD's DIB CS/IA program is a voluntary program to enhance and supplement DIB participants' capabilities to safeguard DoD information that resides on, or transits, DIB unclassified information systems.
US-CERT Bulletins - Department of Homeland Security
Bulletins provide weekly summaries of new vulnerabilities. Patch information is provided when available.
US-CERT Alerts - Department of Homeland Security
Alerts provide timely information about current security issues, vulnerabilities, and exploits.
National Vulnerability Database - NIST
NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.
Trustworthy CyberSpace: Strategic Plan For The Federal Cybersecurity Research and Development Program - NITRD
Committee on National Security Systems (CNSS) - Committee on National Security Systems
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.
Leave a Comment
You must be logged in to post a comment.