The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
DISA Expanding Scope, Price Tag Of MilCloud 2.0 - Federal News Radio
The Defense Information Systems Agency is tripling the contract time and quintupling the financial ceiling for the replacement of its government-operated MilCloud service.
Money will enhance the culture of security within DOE’s utility members’ organizations.
Security experts and former officials say the attacks on computer networks at airports and government ministries are designed to demonstrate China's cyber power and deter online retaliation.
Hackers Claim to Auction NSA Source Code - The Hill
Hackers calling themselves Shadow Brokers are auctioning off what they claim is the source code to a vaunted, likely state-sponsored hacking group many believe is affiliated with the National Security Agency.
U.S. Intelligence to Help Companies Thwart Supply-Chain Hacking - Insurance Journal
U.S. intelligence officials are planning to provide information including classified threat reports to companies about the risks of hacking and other crimes tied to the supplies and services they buy.
Majority of Healthcare Leaders Elevating Cybersecurity As a Priority, According To HIMSS - Healthcare IT News
But many say lack of financial resources and personnel is hindering better security practices.
All Phase-Change Neuromorphic Device Recognises Correlations - Nano Tech Web
Traditional programmable computers are facing fundamental limitations in terms of speed and size, inspiring increasing interest in alternative paradigms such as neuromorphic computing.
The Bandwidth Bottleneck That Is Throttling The Internet - Scientific American
Researchers are scrambling to repair and expand data pipes worldwide and to keep the information revolution from grinding to a halt.
Though Apple's move might seem to decrease iOS security at first, it will actually allow many more to try and poke holes in Apple's products and Apple, in turn, can patch them up faster.
Network security – Stick to the plan - SC Magazine
Will Embrey argues that, to maximise its budget and resources, determining a company's network security strategy should fall on the shoulders of its CEO.
Quantum Computing Breakthrough: Oxford University Scientists Achieve Incredibly Accurate Logic Gate - IB Times
Computer scientists have reached the theoretical benchmark required to build a quantum computer.
One of the most active Trojans this year has changed tactics and now installing backdoors on target machines instead of ransomware.
Cortana: The spy in Windows 10 - Computer World
Cortana, Windows 10’s built-in virtual assistant, is both really cool and really creepy.
End of SMS-based 2-Factor Authentication; Yes, It’s Insecure! - The Hacker News
Two-Factor Authentication or 2FA adds an extra step of entering a random passcode sent to you via an SMS or call when you log in to your account as an added layer of protection.
Bring Cyberwarfare Further Out Of The Shadows - Washington Post
Thousands of U.S. businesses and other institutions have been besieged by cyberattacks in recent years. But the penetration of the Democratic National Committee stands out.
Your Battery Status is Being Used to Track You Online - The Guardian
A little-known web standard that lets site owners tell how much battery life a mobile device has left has been found to enable tracking online, a year after privacy researchers warned that it had the potential to do just that.
Cyber Security of Critical Infrastructure - Department of Homeland Security
CSIAC serves on the EO 13636/PPD-21 Research & Development (R&D) Working Group (WG) run by DHS S&T. If you would like further information, contact Dr. Paul Losiewicz at email@example.com
The Cyber COI engages in multiple activities and forums for coordinating cyber S&T strategies, sharing innovative ideas and technical approaches, promoting technology transfer and upcoming business opportunities, and in jointly planning programs across the Department of Defense and other government agencies. Membership is based upon approval by the Cyber COI group administrator.
DOD OSBP officials acknowledged that cybersecurity is an important and timely issue for small businesses -and therefore the office is considering incorporating cybersecurity into its existing outreach and education efforts. During the review, GAO identified 15 existing federal cybersecurity resources that DOD OSBP could disseminate to defense small businesses.
The Department of Defense Cyber Strategy - Department of Defense
The purpose of this strategy is to guide the development of DoD's cyber forces and strengthen our cyber defense and cyber deterrence posture. It focuses on building cyber capabilities and organizations for DoD's three primary cyber missions.
Tags: Cybersecurity Strategy
The Information Sharing Environment (ISE) broadly refers to the people, projects, systems, and agencies that enable responsible information sharing for national security.
Standards & Reference Documents - CSIAC
View all Best Practices and Reference Documents on the CSIAC website.
DoD Cyber Domain Resources - Department of Defense
DHS Cyber Security Strategy (“Blueprint for a Secure Cyber Future”, 2011) - Department of Homeland Defense
DIB CS/IA Voluntary Information Sharing Program - DoD DIBNet
DoD's DIB CS/IA program is a voluntary program to enhance and supplement DIB participants' capabilities to safeguard DoD information that resides on, or transits, DIB unclassified information systems.
US-CERT Bulletins - Department of Homeland Security
Bulletins provide weekly summaries of new vulnerabilities. Patch information is provided when available.
US-CERT Alerts - Department of Homeland Security
Alerts provide timely information about current security issues, vulnerabilities, and exploits.
NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.
Trustworthy CyberSpace: Strategic Plan For The Federal Cybersecurity Research and Development Program - NITRD
Committee on National Security Systems (CNSS) - Committee on National Security Systems
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.