The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
There’s been no shortage of companies in the news for data leaks in the past decade as a result of hacking, inside jobs, poor security and other reason.
The first task of Britain's new cybersecurity centre will be to work with the Bank of England, the government has announced.
Last week, Sen. Charles Schumer (D-N.Y.) confirmed that, two years ago, the Bowman Avenue Dam in Rye Brook, New York was accessed remotely by Iranian hackers – a move characterized as “shot across our bow” and a clear indication of the tremendous risk that cyber attackers pose.
China Continuing Cyber Attacks on U.S. Networks - Washington Free Beacon
Cybercom says foreign governments using hacker groups to hide cyber attack origins.
The Baltic Elves Taking on Pro-Russian Trolls - The Daily Beast
What at first looked like as a social media grudge match could be a precursor to invasion, war, and resistance in the Baltics.
Attackers will focus on critical data in 2016, mainly with the motive of cyber extortion, according to the latest threat report from F-Secure.
Wrangler Supercomputer Speeds Through Big Data - Eurek Alert
Data-intensive supercomputer brings new users to high performance computing for science.
Google says “Orchestration” is Next Big Trend in the Internet of Things - Dallas Business Journal
The Internet of Things has officially advanced past the "hype" stage, according to conference panelists including a Google developer.
The chairman of the Senate Intelligence Committee says a bill to give law enforcement access to encrypted data could come as early as next week.
Apple Engineers Could Quit Over iPhone Encryption Case - Information Week
Several Apple engineers have told the New York Times that they'd consider leaving one of the industry's most prized companies and positions rather than be made to create a so-called GovtOS to crack the iPhone's encryption technology.
Researchers have built and demonstrated a novel configurable computing device that uses a thousand times less electrical power – and can be built up to a hundred times smaller – than comparable digital floating-gate configurable devices currently in use.
Private Sector Buy-In Critical to Cybersecurity Commission Success - FierceGovernmentIT
The success of the President's Commission for Enhancing National Cybersecurity depends heavily on buy-in and advocacy from the private sector, agency officials explained at a New America cybersecurity conference in Washington, D.C., last Wednesday.
U.S. Army Cyber Command and Second Army is kicking off new initiatives to help realize the Secretary of Defense's vision for greater collaboration between DOD and Silicon Valley.
Sharing Real-Time Cyber Threats Part of Year-Long DHS Effort - Federal News Radio
Private sector organizations receive liability protection when they share cyber threat indicators with DHS, and share information with other agencies (including CYBERCOM) in near real-time.
The person responsible for the government's Heartbleed response will pioneer DHS's outreach in Silicon Valley.
Enhance Shared Situational Awareness - Homeland Security
The vision of the Enhance Shared Situational Awareness (ESSA) Initiative is to create real-time cybersecurity situational awareness, to enable integrated operational actions, and to improve the security of the U.S. Government and U.S. critical infrastructure.
In a public service announcement issued together with the Department of Transportation and the National Highway Traffic and Safety Administration, the FBI on Thursday released a warning to drivers about the threat of over-the-internet attacks on cars and trucks.
The U.S. National Security Agency chief said on Tuesday it was a "matter of when, not if" a foreign nation-state attempts to launch a cyber attack on the U.S. critical infrastructure, citing the recent hack on Ukraine's power grid as a cause for concern.
U.S. government cyber security experts officially declared that hackers are to blame for a power outage in Ukraine that affected nearly a quarter million people in the latest significant attack on vulnerable "critical infrastructure."
Here’s Why the FBI Can’t Hack an iPhone Without Apple’s Help - Tech Insider
In case you haven't heard, Apple announced Tuesday that it's refusing to write code for the FBI that would unlock one of the San Bernardino shooters' iPhones.
Making a typo while punching in the addresses of popular websites could lead to major headache for technology users.
Cyber Security of Critical Infrastructure - Department of Homeland Security
CSIAC serves on the EO 13636/PPD-21 Research & Development (R&D) Working Group (WG) run by DHS S&T. If you would like further information, contact Dr. Paul Losiewicz at firstname.lastname@example.org
The Cyber COI engages in multiple activities and forums for coordinating cyber S&T strategies, sharing innovative ideas and technical approaches, promoting technology transfer and upcoming business opportunities, and in jointly planning programs across the Department of Defense and other government agencies. Membership is based upon approval by the Cyber COI group administrator.
DOD OSBP officials acknowledged that cybersecurity is an important and timely issue for small businesses -and therefore the office is considering incorporating cybersecurity into its existing outreach and education efforts. During the review, GAO identified 15 existing federal cybersecurity resources that DOD OSBP could disseminate to defense small businesses.
DHS S&T Collaboration Community - Ideascale
The National Conversation is intended to bring together everyone to play a role in shaping the future of homeland security technology. This means responders, operational users, citizens, academia, and industry.
The Department of Defense Cyber Strategy - Department of Defense
The purpose of this strategy is to guide the development of DoD's cyber forces and strengthen our cyber defense and cyber deterrence posture. It focuses on building cyber capabilities and organizations for DoD's three primary cyber missions.
The Information Sharing Environment (ISE) broadly refers to the people, projects, systems, and agencies that enable responsible information sharing for national security.
Standards & Reference Documents - CSIAC
View all Best Practices and Reference Documents on the CSIAC website.
DoD Cyber Domain Resources - Department of Defense
DHS Cyber Security Strategy (“Blueprint for a Secure Cyber Future”, 2011) - Department of Homeland Defense
DIB CS/IA Voluntary Information Sharing Program - DoD DIBNet
DoD's DIB CS/IA program is a voluntary program to enhance and supplement DIB participants' capabilities to safeguard DoD information that resides on, or transits, DIB unclassified information systems.
US-CERT Bulletins - Department of Homeland Security
Bulletins provide weekly summaries of new vulnerabilities. Patch information is provided when available.
US-CERT Alerts - Department of Homeland Security
Alerts provide timely information about current security issues, vulnerabilities, and exploits.
NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.
Trustworthy CyberSpace: Strategic Plan For The Federal Cybersecurity Research and Development Program - NITRD
Committee on National Security Systems (CNSS) - Committee on National Security Systems
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.