Cybersecurity

Cybersecurity (CS) (formerly referred to as information assurance [IA]) is defined as the technologies, processes, and practices designed for prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communication services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and non-repudiation.

Recent Inquiries

Can a “splunk report” be used to identify which users access a website to target specific groups of upcoming changes, and how can it be obtained?

Can a "splunk report" be used to identify which users access a website to target specific groups of upcoming changes, and how can it be obtained?

What efforts are currently being worked for quantum antennas on U.S. Department of Defense platforms?

What efforts are currently being worked for quantum antennas on U.S. Department of Defense platforms?

What software/middleware creates virtual and constructive cyber effects in live, virtual, and constructive testing and training events?

What software/middleware creates virtual and constructive cyber effects in live, virtual, and constructive testing and training events?

Articles

F

Understanding and Responding to Distributed Denial-of-Service Attacks

This joint guide, Understanding and Responding to Distributed Denial-of-Service (DDoS) Attacks, addresses the specific needs and challenges faced by organizations in defending against DDoS attacks. The guidance now includes detailed insight into three different types…

F

NSA Releases Top Ten Cloud Security Mitigation Strategies

FORT MEADE, Md. – The National Security Agency (NSA) is releasing “Top Ten Cloud Security Mitigation Strategies” to inform cloud customers about important security practices as they shift their data to cloud environments. The report…

F

CISA Publishes Repository for Software Attestation and Artifacts

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) announces the availability of the Repository for Software Attestation and Artifacts that software producers who partner with the federal government can use to upload software attestation…

Webinars

Validating the Integrity of Computing Devices

Today’s technologies rely on complex, globally distributed, and interconnected supply chain ecosystems to provide highly refined, cost-effective, and reusable solutions. These supply chains of information and communications technologies are increasingly at risk of compromise. To…

Improving Security, Privacy, and Authentication With a Quantum-Enhanced TCP/IP Protocol

Secure communications need to exchange encryption keys over encrypted channels often implemented with asymmetric algorithms. Because both the session key transmission and digital signatures use algorithms like RSA (Rivest–Shamir–Adleman), they are vulnerable to future quantum…

Open-Source Security and Generative AI: Navigating Concerns While Enhancing Development

This webinar will explore the impact of OpenAI’s ChatGPT, GitHub CoPilot, and other generative artificial intelligence (AI) tools on open-source software and security. With over 100 million users within its first two months of public…

Events

A padlock on a monitor with 0s and 1s surrounding it.

Gartner Security & Risk Management Summit

In today’s rapidly evolving digital landscape, cybersecurity resilience underscores the importance of adapting and fortifying your organization’s defenses against an array of cyberthreats. Cybersecurity leaders must navigate a complex and ever-changing environment where cyberattacks can…

Soldier points while detection equipment is mounted on their back.

The 92nd Military Operations Research Symposium

For over 55 years, the annual Military Operations Research Symposium (MORS) has been the an opportunity for the national security community to exchange information, examine research and discuss critical national security topics. Held in notable…

HammerCon 2024

HammerCon 2024 is a 1-day event located in Laurel, Maryland on Thursday, May 16th, 2024. This event, hosted by the Military Cyber Professionals Association, will allow an attendee to participate in one of three tracks…