The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
Join the CSIAC and Subject Matter Experts in discussing the recently released NIST guidelines SP 800-171. Topics include what impact it has on your organization, and how you can begin to implement its IA guidelines.
This webinar will showcase an input validation failure by demonstrating a known command injection vulnerability within an open-source firewall application. It will then discuss methods of input validation, while demonstrating techniques to reduce the likelihood of this critical vulnerability.
Threats To Critical Infrastructure, Cyber Require Partnership With Industry - Federal News Radio
Now more than ever it’s necessary for the Homeland Security Department to work with the private sector to protect critical infrastructure and the American people against terrorism and cyber threats.
Ardit Ferizi, aka Th3Dir3ctorY, 20, a citizen of Kosovo, pleaded guilty today before U.S. District Judge Leonie M. Brinkemaof the Eastern District of Virginia to providing material support to the Islamic State of Iraq and the Levant (ISIL), a designated foreign terrorist organization, and accessing a protected computer without authorization and obtaining information.
Cyberspace has joined air, sea, land, and space as an arena of military interest: but the concept of cyberwarfare continues of evolve beyond the grasp of military planners.
The familiar Common Access Card, though it may still be used for physical access, will be replaced for login by multi-factor authentication including biometrics and behavioral characteristics.
Fraud and abuse investigations dating back to 2004 vanished when a database became corrupted, service officials said.
This Public Service Announcement (PSA) is an update to the Business E-mail Compromise (BEC) information provided in Public Service Announcements (PSA) 1-012215-PSA and 1-082715a-PSA. This PSA includes new Internet Crime Complaint Center (IC3) complaint information and updated statistical data.
When we eventually get to look back on 2016, we might be tempted to label it “The Year of Leaking Voter Lists.”
Computer manufacturer Acer has suffered a data breach at its U.S. e-commerce site, Acer.com, that could possibly affect anyone that purchased from the site over the last year or so.
The research deal between the department and the venerable standards organization will encompass Internet-connected devices, but also the networks on which they're deployed — an "end to end" view.
Two bills from Rep. John Ratcliffe (R-Texas) to foster relationships between Homeland Security and cybersecurity researchers passed the House on Tuesday night.
A vulnerability in the web interface of the Cisco RV110W Wireless-N VPN Firewall, Cisco RV130W Wireless-N Multifunction VPN Router, and Cisco RV215W Wireless-N VPN Router could allow an unauthenticated, remote attacker to execute arbitrary code as root on a targeted system.
Representatives from Google, Facebook, Dropbox and other companies spoke at the meeting, asking the commission to make recommendations on transparency, threat sharing and privacy for consumer data.
U.S. CYBERCOM's Cyber Guard and Cyber Flag programs have one drawback: They aren’t scalable training events.
For the last two weeks, the tech world’s security teams have been practically under siege.
Google has come up with a new quantum computing technique that could remove key limits on scalability today.
There's an unseen world war that has been fought for years with no clear battle lines, few rules of engagement, and no end in sight.
Cyber Security of Critical Infrastructure - Department of Homeland Security
CSIAC serves on the EO 13636/PPD-21 Research & Development (R&D) Working Group (WG) run by DHS S&T. If you would like further information, contact Dr. Paul Losiewicz at firstname.lastname@example.org
The Cyber COI engages in multiple activities and forums for coordinating cyber S&T strategies, sharing innovative ideas and technical approaches, promoting technology transfer and upcoming business opportunities, and in jointly planning programs across the Department of Defense and other government agencies. Membership is based upon approval by the Cyber COI group administrator.
DOD OSBP officials acknowledged that cybersecurity is an important and timely issue for small businesses -and therefore the office is considering incorporating cybersecurity into its existing outreach and education efforts. During the review, GAO identified 15 existing federal cybersecurity resources that DOD OSBP could disseminate to defense small businesses.
DHS S&T Collaboration Community - Ideascale
The National Conversation is intended to bring together everyone to play a role in shaping the future of homeland security technology. This means responders, operational users, citizens, academia, and industry.
The Department of Defense Cyber Strategy - Department of Defense
The purpose of this strategy is to guide the development of DoD's cyber forces and strengthen our cyber defense and cyber deterrence posture. It focuses on building cyber capabilities and organizations for DoD's three primary cyber missions.
The Information Sharing Environment (ISE) broadly refers to the people, projects, systems, and agencies that enable responsible information sharing for national security.
Standards & Reference Documents - CSIAC
View all Best Practices and Reference Documents on the CSIAC website.
DoD Cyber Domain Resources - Department of Defense
DHS Cyber Security Strategy (“Blueprint for a Secure Cyber Future”, 2011) - Department of Homeland Defense
DIB CS/IA Voluntary Information Sharing Program - DoD DIBNet
DoD's DIB CS/IA program is a voluntary program to enhance and supplement DIB participants' capabilities to safeguard DoD information that resides on, or transits, DIB unclassified information systems.
US-CERT Bulletins - Department of Homeland Security
Bulletins provide weekly summaries of new vulnerabilities. Patch information is provided when available.
US-CERT Alerts - Department of Homeland Security
Alerts provide timely information about current security issues, vulnerabilities, and exploits.
NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.
Trustworthy CyberSpace: Strategic Plan For The Federal Cybersecurity Research and Development Program - NITRD
Committee on National Security Systems (CNSS) - Committee on National Security Systems
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.