Cybersecurity (CS) (formerly referred to as information assurance [IA]) is defined as the technologies, processes, and practices designed for prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communication services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and non-repudiation.

Recent Inquiries

What software/middleware creates virtual and constructive cyber effects in live, virtual, and constructive testing and training events?

What software/middleware creates virtual and constructive cyber effects in live, virtual, and constructive testing and training events?

Guaranteeing AI Robustness against Deception (GARD)

Counter-AI Offensive Tools and Techniques

What is the state of industry investment in and development of products in support of counter-artificial intelligence offensive tools and techniques?

Can you provide information on secure Identity and access management solutions?

Can you provide information on secure identity and access management solutions?


cyber graphic showing an open lock; photo source: Canva, GraphicsFuel

The Post-Quantum Cryptography

Safe digital communication for organizations and individuals is protected online by using cryptography, whether making an online purchase from a favorite online store or sending an email to a friend or colleague. Imagine the impact if cybercriminals could break the cryptographic algorithms used to encrypt all our banking, medical information and history, or any sensitive data we use in our day-to-day digital life.

graphic of computer monitor with images of soldiers and helicopters on it; photo source: Canva

Modeling & Simulation: Battle Readiness in a Virtual World

As the world becomes more complex, the U.S. Department of Defense (DoD) faces a range of challenges that demands innovative solutions. One tool that has proven invaluable in this regard is modeling and simulation (M&S)—the process of creating a representation of a system or process and then using that representation to explore and test different scenarios.

graphic showing an iceberg with people and aircraft above the water line (photo source: Canva)

Dark Net Usage for Countries in Conflict

For many, the “dark web” harbors a stigma. After the rise of notorious “dark net markets” like “Silk Road” and “AlphaBay” in the early 2010s, pop culture has come to equate the “dark web” with illegality and contraband.


Open-Source Security and Generative AI: Navigating Concerns While Enhancing Development

This webinar will explore the impact of OpenAI’s ChatGPT, GitHub CoPilot, and other generative-artificial intelligence (AI) tools on open-source software and security. With over 100 million users within its first two months of public release,…

RESCHEDULED: Fundamentals of Cross-Domain Solutions in the DoD

THIS WEBINAR HAS BEEN RESCHEDULED FOR WEDNESDAY, FEBRUARY 21st at 12:00 PM ET A cross-domain solution (CDS) is a capability that can be used to securely connect discrete systems or networks, which may have different…

Defending Against the Cyber Adversary

The United States is continuously targeted by adversaries who utilize methods of asymmetric cyberwarfare.  These global actors operate with malicious intent to steal military intelligence and intellectual property. They also use spyware and other forms…


The words "Cyber Security" hovering over several computer monitors.

Sunshine Cyber Conference

Cyber Florida is pleased to announce the return of our popular annual conference, now called the Sunshine Cyber Conference. Save the date for 27-28 March 2024 at the newly renovated Tampa Convention Center. Designed to…

Robot and Scientist shaking hands. Programming code is present on the all sides of the image.

RSA Conference 2024

The RSA Conference is a cyber-related event where industry professionals converge to learn, forge connections, and advance their careers. Throughout the 4 day conference, key talking points will include: Artificial Intelligence DevSecOps Factor Analysis of…

A padlock on a monitor with 0s and 1s surrounding it.


Every year, CybSafe hosts IMPACT—a free conference that puts the latest research on the human aspect of cybersecurity on center stage. Like its predecessors, the first USA IMPACT will bring researchers together to share knowledge…