The Cybersecurity (CS) Digest is a curated bi-weekly news summary for cybersecurity professionals. It is transmitted in an HTML-formatted email and provides links to articles and news summaries across a spectrum of cybersecurity topics.
Navy, Marine Corps Gain New Latitude to Buy Cloud Computing Services - Federal News Radio
In a step that may go some way toward reducing some of the red tape between the Defense Department and cloud computing vendors, the Department of the Navy (DoN) said last week that the Navy and Marine Corps can sign off on their own business cases for migrating to commercial cloud vendors without seeking higher-level approval.
Following the huge debacle related to the LinkedIn data breach that came to light last week, Microsoft's Identity Protection team has decided to ban the usage of common or simple passwords that may be easy to guess or have already appeared in breach lists.
Malwarebytes security researcher Hasherezade has dissected the most recent version of the DMA Locker ransomware, which she claims made important strides in improving quality overall and getting ready for a massive distribution campaign.
Encrypted systems now being added to botnets in the latest incarnations of ransomware attacks, with experts expecting this to become standard practice.
ICIT Explains NIST Guide Impact on Healthcare Cybersecurity - HealthIT Security
A recent NIST design guide discussing integrating security measures into the development process could potentially affect healthcare cybersecurity.
Diabetes Technology Society Launches Cybersecurity Standard for Medical Devices - Healthcare IT News
The public platform, DTSec, contains a set of security performance requirements to prevent cyberattacks and data breaches.
ICSA Labs now offers a security testing program for IoT products, following the recently announced 'CyberUL' security certification program.
2017 Budget is ‘Make or Break’ For Cybersecurity - Federal News Radio
The fiscal 2017 budget is a “make or break” point for cybersecurity and the federal government, said a top Department of Homeland Security official.
The bipartisan duo said the advice comes after recent cyberattacks against Congress and a high-profile vulnerability in phone networks.
Critical Vulnerability Plagues 60% of Android Devices - Security Week
A Critical Elevation of Privilege (EoP) vulnerability in the Qualcomm Secure Execution Environment (QSEE) affects around 60 percent of all Android devices around the world, despite being already fixed, researchers warn.
Charismatic Canadian PM Justin Trudeau recently put quantum computing in the spotlight when his explanation of the complex technology went viral. But how far off is a quantum computer and what could it achieve?
There's an unseen world war that has been fought for years with no clear battle lines, few rules of engagement, and no end in sight.
Keeping the World’s Lights On: The Urgent Need to Secure Critical Infrastructure from Cyber-Threat - Information Security Buzz
The world needs to wake up to the vulnerability of critical infrastructures to cyber-attack and to respond, emphatically, with Government regulation, industry-wide collaboration, education and deep, tailored protection.
Carter Says Cyber Warfare on DAESH Can Set Model - TRT World
Cyber attack techniques used by the US-led coalition against DAESH could also be used by other countries, US Defense Secretary Ashton Carter.
Security: It’s a Big Data Problem - Data Informed
Data breaches are occurring with greater frequency than ever before and have increasingly devastating effects on everyone from small businesses to Fortune 500 companies to the federal government.
Cyber Security of Critical Infrastructure - Department of Homeland Security
CSIAC serves on the EO 13636/PPD-21 Research & Development (R&D) Working Group (WG) run by DHS S&T. If you would like further information, contact Dr. Paul Losiewicz at firstname.lastname@example.org
The Cyber COI engages in multiple activities and forums for coordinating cyber S&T strategies, sharing innovative ideas and technical approaches, promoting technology transfer and upcoming business opportunities, and in jointly planning programs across the Department of Defense and other government agencies. Membership is based upon approval by the Cyber COI group administrator.
DOD OSBP officials acknowledged that cybersecurity is an important and timely issue for small businesses -and therefore the office is considering incorporating cybersecurity into its existing outreach and education efforts. During the review, GAO identified 15 existing federal cybersecurity resources that DOD OSBP could disseminate to defense small businesses.
DHS S&T Collaboration Community - Ideascale
The National Conversation is intended to bring together everyone to play a role in shaping the future of homeland security technology. This means responders, operational users, citizens, academia, and industry.
The Department of Defense Cyber Strategy - Department of Defense
The purpose of this strategy is to guide the development of DoD's cyber forces and strengthen our cyber defense and cyber deterrence posture. It focuses on building cyber capabilities and organizations for DoD's three primary cyber missions.
The Information Sharing Environment (ISE) broadly refers to the people, projects, systems, and agencies that enable responsible information sharing for national security.
Standards & Reference Documents - CSIAC
View all Best Practices and Reference Documents on the CSIAC website.
DoD Cyber Domain Resources - Department of Defense
DHS Cyber Security Strategy (“Blueprint for a Secure Cyber Future”, 2011) - Department of Homeland Defense
DIB CS/IA Voluntary Information Sharing Program - DoD DIBNet
DoD's DIB CS/IA program is a voluntary program to enhance and supplement DIB participants' capabilities to safeguard DoD information that resides on, or transits, DIB unclassified information systems.
US-CERT Bulletins - Department of Homeland Security
Bulletins provide weekly summaries of new vulnerabilities. Patch information is provided when available.
US-CERT Alerts - Department of Homeland Security
Alerts provide timely information about current security issues, vulnerabilities, and exploits.
NVD is the U.S. government repository of standards based vulnerability management data represented using the Security Content Automation Protocol (SCAP). This data enables automation of vulnerability management, security measurement, and compliance. NVD includes databases of security checklists, security related software flaws, misconfigurations, product names, and impact metrics.
Trustworthy CyberSpace: Strategic Plan For The Federal Cybersecurity Research and Development Program - NITRD
Committee on National Security Systems (CNSS) - Committee on National Security Systems
The CS Digest provides links to third party Websites. The CSIAC is not responsible for the availability of, and content provided on, third party Websites. You should refer to the policies posted by other Websites regarding their privacy and other topics before you use them. The CSIAC is not responsible for third party content accessible through the CSIAC CS Digest, including opinions, advice, statements, advertisements and endorsements, and you bear all risks associated with the use of such content.