The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
DISA Lays Groundwork for Commercial Cloud Computing Contract - AFCEA SIGNAL
Request for Proposals For Commercial Cloud Technologies to support DoD pending
An Education in Cyber Security - Automation World
Industrial Control Systems community responding to the E.O. on Cybersecurity of Critical Infrastructure - but much remains to be done
China says US-based hackers target its military websites, amid competing cybersnooping claims - Washington Post
Official response to Mandiant did not take long
Lessons from the cyber attacks on South Korea - Japan Times
In absence of current legal Self Defense Force responsibility for cyberspace, Japan Times calls for response that includes planned, coordinated attacks, combining cyber and physical (kinetic) offensive means
U.S.-Israeli cyber attack on Iran was ‘act of force’, NATO study found - Washington Times
Reported NATO Cooperative Cyber Defense Centre of Excellence study classifies Stuxnet as act of "force" - Study not released yet in Tallinn - https://web.archive.org/web/20131029205100/http://www.ccdcoe.org/2.html
South Korean Cyber attack used Update Manager to wipe Master Boot Records
A Strange Computer Promises Great Speed - New York Times
Lockheed Martin purchases D-Wave's adiabatic quantum computer for use in defense systems modeling and simulation
Securing the Internet of Things - Cisco
Wake-up call for pervasive computing - What will the Internet of Everything developers learn from the industrials controls community?
Great overview of the technical challenges ahead for BYOD
In FY14, pending OSD approval, DISA Network Defense service will move to Defense Working Capital Fund (DWCF)
Your IT Infrastructure just moved to a higher Level of Risk
Supposedly stronger Type 4 passwords only used a single pass of SHA-256, thus admitted to be less resilient to brute-force attacks than a Type 5
Bitcoin mining is now DRIVING hardware R&D
Spear-fishing e-mails identified by F-Secure as delivery vector for attack, source still under investigation
Spam dispute becomes ‘largest cyber attack’ in history of the internet - Sydney Morning Herald
The Private Sector is also capable of major cyber offensives!
14 February GAO report: National Strategy, Roles, and Responsibilities Need to Be Better Defined and More Effectively Implemented
This time, the motive appears to support only North Korean aggression
50 MILLION accounts compromised in a similar manner to "the many high profile attacks on other Internet-based companies that have taken place over the last several weeks"
Bradley Manning pleads guilty to 10 lesser charges, explains motive - Washington Post
Insider Threat: You can still exfiltrate a lot of classified data on a CD.
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.