Cybersecurity

Cybersecurity (CS) (formerly referred to as information assurance [IA]) is defined as the technologies, processes, and practices designed for prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communication services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and non-repudiation.

Recent Inquiries

Current Landscape and Technologies of Binary Code Scanning Tools

What tools exist for detecting cyber vulnerabilities in firmware samples?

Can you provide information and a government point of contact for the ChatSurfer software?

Can you provide information and a government point of contact for the ChatSurfer software?

Can a “splunk report” be used to identify which users access a website to target specific groups of upcoming changes, and how can it be obtained?

Can a "splunk report" be used to identify which users access a website to target specific groups of upcoming changes, and how can it be obtained?

Articles

F

New “Overlays” Provide Guide on Path to Zero Trust

The Defense Department’s chief information officer today released the nearly 400-page “Zero Trust Overlays” document designed to serve as both a road map and guide for helping the department achieve goals set forth in a 2021…

F

NSA Releases Guidance on the Visibility and Analytics Pillar of Zero Trust

FORT MEADE, Md. – The National Security Agency (NSA) is releasing the Cybersecurity Information Sheet (CSI), “Advancing Zero Trust Maturity Throughout the Visibility and Analytics Pillar,” which details the infrastructure, tools, data, and techniques of this cornerstone…

F

NIST Finalizes Updated Guidelines for Protecting Sensitive Information

Contractors and other organizations that do business with the federal government now have clearer, more straightforward guidance for protecting the sensitive data they handle. The National Institute of Standards and Technology (NIST) has finalized its…

Webinars

Do I Need Cybersecurity Maturity Model Certification (CMMC) and Why?

On November 2010, President Obama issued Executive Order 13556 that formed the controlled unclassified information (CUI) program. Six years later, the Defense Federal Acquisition Regulation Supplement (DFARS) 252.204-7012 was published, establishing requirements for CUI, making…

Staying Ahead of the Curve: Planning for the Migration to Post-Quantum Cryptography

This webinar will explore cryptographic discovery (inventory) and interoperability and performance of the post-quantum cryptographic (PQC) algorithms being standardized by the National Institute of Standards and Technology (NIST) as framed by the following two publications…

Validating the Integrity of Computing Devices

Today’s technologies rely on complex, globally distributed, and interconnected supply chain ecosystems to provide highly refined, cost-effective, and reusable solutions. These supply chains of information and communications technologies are increasingly at risk of compromise. To…

Events

Cybersecurity and Technology Innovation Conference 2024

The Department of Energy’s (DOE’s) Cybersecurity and Technology Innovation Conference will explore the developments and challenges in cybersecurity, technology innovation, workforce development, and critical infrastructure protection. Speakers and attendees will include leaders from across the…

Silhouette of a person with programming code surrounding them.

Black Hat USA 2024

Now in its 27th year, Black Hat USA returns to the Mandalay Bay Convention Center in Las Vegas with a six-day program. The event will open with four days of cybersecurity training (August 3-8), with…

The words "Cyber Security" hovering over several computer monitors.

Cyber Security Training at SANSFIRE Washington, DC 2024

This event is focused on highlighting what steps are necessary to defend an organization from external threats before a breach occurs in today’s workplace. To accomplish this, 40 virtual or in-person cybersecurity courses are offered…