Cybersecurity

Cybersecurity (CS) (formerly referred to as information assurance [IA]) is defined as the technologies, processes, and practices designed for prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communication services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and non-repudiation.

Recent Inquiries

Can you provide information and a government point of contact for the ChatSurfer software?

Can you provide information and a government point of contact for the ChatSurfer software?

Can a “splunk report” be used to identify which users access a website to target specific groups of upcoming changes, and how can it be obtained?

Can a "splunk report" be used to identify which users access a website to target specific groups of upcoming changes, and how can it be obtained?

What efforts are currently being worked for quantum antennas on U.S. Department of Defense platforms?

What efforts are currently being worked for quantum antennas on U.S. Department of Defense platforms?

Articles

F

ED 24-02: Mitigating the Significant Risk From Nation-State Compromise of Microsoft Corporate Email System

The Russian state-sponsored cyber actor known as Midnight Blizzard has exfiltrated email correspondence between Federal Civilian Executive Branch (FCEB) agencies and Microsoft through a successful compromise of Microsoft corporate email accounts. Microsoft has disclosed the…

F

CISA Announces Malware Next-Gen Analysis

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) announces a new release of our malware analysis system, called Malware Next-Gen, which allows any organization to submit malware samples and other suspicious artifacts for analysis….

F

DoD Cyber Officials Detail Progress on Zero Trust Framework Roadmap

The U.S. Department of Defense (DoD) is on track to implement its zero trust cybersecurity framework by the end of fiscal year 2027, senior Pentagon information technology officials said. David McKeown, who serves as the…

Webinars

Staying Ahead of the Curve: Planning for the Migration to Post-Quantum Cryptography

This webinar will explore cryptographic discovery (inventory) and interoperability and performance of the Post-Quantum Cryptographic (PQC) algorithms being standardized by the National Institute of Standards and Technology (NIST) as framed by the following two publications…

Validating the Integrity of Computing Devices

Today’s technologies rely on complex, globally distributed, and interconnected supply chain ecosystems to provide highly refined, cost-effective, and reusable solutions. These supply chains of information and communications technologies are increasingly at risk of compromise. To…

Improving Security, Privacy, and Authentication With a Quantum-Enhanced TCP/IP Protocol

Secure communications need to exchange encryption keys over encrypted channels often implemented with asymmetric algorithms. Because both the session key transmission and digital signatures use algorithms like RSA (Rivest–Shamir–Adleman), they are vulnerable to future quantum…

Events

Systems Thinking Training

REGISTRATION IS NOW CLOSED.  THIS CLASS IS COMPLETELY FULL. Cybersecurity professionals know that the human element is a wild card in even the best-designed systems. As a complex socio-technical system with human and engineered components,…

A padlock on a monitor with 0s and 1s surrounding it.

Gartner Security & Risk Management Summit

In today’s rapidly evolving digital landscape, cybersecurity resilience underscores the importance of adapting and fortifying your organization’s defenses against an array of cyberthreats. Cybersecurity leaders must navigate a complex and ever-changing environment where cyberattacks can…

Soldier points while detection equipment is mounted on their back.

The 92nd Military Operations Research Symposium

For over 55 years, the annual Military Operations Research Symposium (MORS) has been the an opportunity for the national security community to exchange information, examine research and discuss critical national security topics. Held in notable…