The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
The Defense Information Systems Agency (DISA) has granted IBM authority to operate IBM Cloud services for Department of Defense (DoD) agencies.
How to Mitigate Your Cloud Computing Risks - IT Proportal
Cloud computing technology is fast becoming a solution for problems that have plagued organisations and taxed IT departments for years.
Russia was behind a December cyber attack on Ukraine's power grid that caused widespread power outages, a senior Obama administration official said Thursday.
DARPA is launching the Anti-Submarine Warfare Continuous Trail Unmanned Vessel, or the ACTUV, on its maiden mission in April. The 132-foot, 140-ton drone is capable of hunting stealth submarines.
The departments of Justice and Homeland Security are investigating a Justice hack allegedly made possible by the enemy of secure logins - IT support.
Russian Interior Ministry cyber-crimes department thwarts Russian banking cyber-crime group.
Does the Hollywood Presbyterian Hack Represent a Frightening New Chapter in Healthcare Cybersecurity? - Healthcare Informatics
Amidst criticism of weak enforcement of Cyber standards by FDA, Hollywood Prebyterian Hospital has serious ransomware attack.
A three-year, $935,000 grant from the Air Force Office of Scientific Research to explore extreme energy efficiency lasers for use in HPC.
The MyShake earthquake app uses cellphones to detect earthquakes as soon as they start. Scientists hope that by turning mobile phones into vast data collection points, they can quickly glean information about the quakes and warn those farther away from the epicenter that shaking is on the way.
Disable this feature to stop your Samsung Smart TV from listening to you.
The US Intelligence Chief Made Some Chilling Predictions for 2016’s Biggest Global Threats - Business Insider
U.S. Director of National Intelligence James Clapper released a report of the main global threats to the United States. Under the Cyber and Technology Category is a concern for the Internet of Things, as both hackers and the govenments can take advantage of connected devices.
DHS Issues Guidance on How to Share Cyberthreat Data - Gov Info Security
Learn about by the Cyber Information Sharing Act (CISA) of 2015.
Andy Ozment on Information Sharing and Cybersecurity - Wall Street Journal
The Homeland Security official discusses the potential impact of recent legislation.
Here’s Why the FBI Can’t Hack an iPhone Without Apple’s Help - Tech Insider
In case you haven't heard, Apple announced Tuesday that it's refusing to write code for the FBI that would unlock one of the San Bernardino shooters' iPhones.
Cisco Security Products Plagued by Critical Flaw - Security Week
In Cisco ASA software, a remote, unauthenticated attacker can exploit the flaw to cause a device to reload or to execute arbitrary code and gain full control of the system.
The target for the Windows 10 deployment is one year, so by this time in 2017, the United States Department of Defense is supposed to complete the transition to the new OS.
President Obama said Wednesday that boosting cybersecurity in the U.S. will require long-term vigilance and overhauling systems currently in place.
FACT SHEET: Cybersecurity National Action Plan - White House
Taking bold actions to protect Americans in today's digital world.
Anyone responsible for Linux-based software or hardware that... "It's a big deal," Washington, DC-based security researcher Kenn White told.
Cyber Security of Critical Infrastructure - Department of Homeland Security
CSIAC serves on the EO 13636/PPD-21 Research & Development (R&D) Working Group (WG) run by DHS S&T. If you would like further information, contact Dr. Paul Losiewicz at email@example.com
The Cyber COI engages in multiple activities and forums for coordinating cyber S&T strategies, sharing innovative ideas and technical approaches, promoting technology transfer and upcoming business opportunities, and in jointly planning programs across the Department of Defense and other government agencies. Membership is based upon approval by the Cyber COI group administrator.
DOD OSBP officials acknowledged that cybersecurity is an important and timely issue for small businesses -and therefore the office is considering incorporating cybersecurity into its existing outreach and education efforts. During the review, GAO identified 15 existing federal cybersecurity resources that DOD OSBP could disseminate to defense small businesses.
DHS S&T Collaboration Community - Ideascale
The National Conversation is intended to bring together everyone to play a role in shaping the future of homeland security technology. This means responders, operational users, citizens, academia, and industry.
The Department of Defense Cyber Strategy - Department of Defense
The purpose of this strategy is to guide the development of DoD's cyber forces and strengthen our cyber defense and cyber deterrence posture. It focuses on building cyber capabilities and organizations for DoD's three primary cyber missions.
The Information Sharing Environment (ISE) broadly refers to the people, projects, systems, and agencies that enable responsible information sharing for national security.
Standards & Reference Documents - CSIAC
View all Best Practices and Reference Documents on the CSIAC website.
DoD Cyber Domain Resources - Department of Defense
DHS Cyber Security Strategy (“Blueprint for a Secure Cyber Future”, 2011) - Department of Homeland Defense
DIB CS/IA Voluntary Information Sharing Program - DoD DIBNet
DoD's DIB CS/IA program is a voluntary program to enhance and supplement DIB participants' capabilities to safeguard DoD information that resides on, or transits, DIB unclassified information systems.
US-CERT Bulletins - Department of Homeland Security
Bulletins provide weekly summaries of new vulnerabilities. Patch information is provided when available.
US-CERT Alerts - Department of Homeland Security
Alerts provide timely information about current security issues, vulnerabilities, and exploits.
NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.
Trustworthy CyberSpace: Strategic Plan For The Federal Cybersecurity Research and Development Program - NITRD
Committee on National Security Systems (CNSS) - Committee on National Security Systems
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.