The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
A recently completed series of Transition to Practice (TTP) Technology Demonstration events successfully brought together government-developed, transition-ready cybersecurity technologies with cybersecurity professionals and stakeholders from the financial, energy, and other critical infrastructure sectors that need the technologies to boost their cyber posture.
Lawmakers Look To ‘Dumb Down’ Smart Grid - The Hill
Lawmakers are taking a look at legislation to improve cybersecurity in critical infrastructure by dumbing down the nation's smart grid.
The hacker that leaked source code and email accounts from the controversial militarized spyware vendor Hacking Team appeared in his first released filmed interview – as a puppet.
Dropping 'Elephant' cyber-epionage group is using old and long-patched flaws as part of its campaign, but appears to be still finding some success.
The familiar Common Access Card, though it may still be used for physical access, will be replaced for login by multi-factor authentication including biometrics and behavioral characteristics.
In recent months, scientists at the Pittsburgh Supercomputing Center reported progress in the fields of genomics, public health, chemistry and machine learning thanks, in part, to a new National Science Foundation-funded supercomputer – Bridges.
Apple iPhones, Macs and other iDevices may be at risk, facing a severe vulnerability similar to the Stagefright bug that ravaged Android. Urgent updates are paramount.
A security software maker says that Chinese cybercriminals have gained access to millions of smartphones around the world.
Cybersecurity Ventures recently reported worldwide spending on cyber defense products and services is forecast to exceed $1 trillion for the five-year period from 2017 to 2021 -- driven by the dramatic rise in cybercrime, the ransomware epidemic, and the refocusing of malware from PCs and laptops to smartphones and mobile devices.
Chinese Government Suspected Of Hacking Into FDIC Computers - Washington Post
The Chinese government is believed to have hacked into computers at the Federal Deposit Insurance Corp. in 2010, 2011 and 2013, including the workstation of then-FDIC Chair Sheila Bair, a congressional report says.
The Library of Congress has fought off a massive cyberattack, officials confirmed Wednesday.
Experimenting With Post-Quantum Cryptography - Google Blog
Quantum computers are a fundamentally different sort of computer that take advantage of aspects of quantum physics to solve certain sorts of problems dramatically faster than conventional computers can.
Post-Quantum Cryptography Aims To Fend Off Advanced Hack Attacks - Top Tech News
Quantum computers promise to enable faster, far more complex calculations than today's silicon chip-based computers. But they also raise the possibility that future computers could retroactively break the security of any digital communications that exist today, which is why Google is experimenting with something called "post-quantum cryptography."
Automakers are sharing information on cyber security threats and working together on ways to respond when hackers strike, under guidelines being developed by the industry.
DARPA Challenge Tests AI as Cybersecurity Defenders - IEEE Spectrum
Today’s malicious hackers have an average of 312 days to exploit “zero-day” computer software flaws before human cybersecurity experts can find and fix those flaws.
DARPA Prepares To Send Plan-X Into Battle - Federal Times
DARPA is close to completing a visually oriented environment that's designed to give cyber warriors instantaneous knowledge of a network attack.
Cyber Security of Critical Infrastructure - Department of Homeland Security
CSIAC serves on the EO 13636/PPD-21 Research & Development (R&D) Working Group (WG) run by DHS S&T. If you would like further information, contact Dr. Paul Losiewicz at firstname.lastname@example.org
The Cyber COI engages in multiple activities and forums for coordinating cyber S&T strategies, sharing innovative ideas and technical approaches, promoting technology transfer and upcoming business opportunities, and in jointly planning programs across the Department of Defense and other government agencies. Membership is based upon approval by the Cyber COI group administrator.
DOD OSBP officials acknowledged that cybersecurity is an important and timely issue for small businesses -and therefore the office is considering incorporating cybersecurity into its existing outreach and education efforts. During the review, GAO identified 15 existing federal cybersecurity resources that DOD OSBP could disseminate to defense small businesses.
DHS S&T Collaboration Community - Ideascale
The National Conversation is intended to bring together everyone to play a role in shaping the future of homeland security technology. This means responders, operational users, citizens, academia, and industry.
The Department of Defense Cyber Strategy - Department of Defense
The purpose of this strategy is to guide the development of DoD's cyber forces and strengthen our cyber defense and cyber deterrence posture. It focuses on building cyber capabilities and organizations for DoD's three primary cyber missions.
Tags: Cybersecurity Strategy
The Information Sharing Environment (ISE) broadly refers to the people, projects, systems, and agencies that enable responsible information sharing for national security.
Standards & Reference Documents - CSIAC
View all Best Practices and Reference Documents on the CSIAC website.
DoD Cyber Domain Resources - Department of Defense
DHS Cyber Security Strategy (“Blueprint for a Secure Cyber Future”, 2011) - Department of Homeland Defense
DIB CS/IA Voluntary Information Sharing Program - DoD DIBNet
DoD's DIB CS/IA program is a voluntary program to enhance and supplement DIB participants' capabilities to safeguard DoD information that resides on, or transits, DIB unclassified information systems.
US-CERT Bulletins - Department of Homeland Security
Bulletins provide weekly summaries of new vulnerabilities. Patch information is provided when available.
US-CERT Alerts - Department of Homeland Security
Alerts provide timely information about current security issues, vulnerabilities, and exploits.
NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.
Trustworthy CyberSpace: Strategic Plan For The Federal Cybersecurity Research and Development Program - NITRD
Committee on National Security Systems (CNSS) - Committee on National Security Systems
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.