CYBERSECURITY

& Information Systems Digest

11 OCTOBER 2022

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

NSA Announces Date of the National Cryptologic Museum Grand Opening

FORT MEADE, Md. — The National Security Agency (NSA) is pleased to announce the Grand Opening of the National Cryptologic Museum. As NSA’s principal gateway to the public, the newly renovated museum will provide a unique opportunity to engage with cryptologic history in fresh and innovative ways – transporting visitors on a journey from the…

Read More...

Featured Notable Technical Inquiry

Security-Conscious Password Behavior From the End-User’s Perspective

Even though technical solutions for security problems are widespread, there are no adequate security measures against precarious user behavior.  Even if hashing and encrypting are used correctly in masking the passwords, attackers can bypass these strong points by going for the weakest link.  Most likely, this will happen through sharing a password, using an already leaked password, or creating a feasibly guessable password (Olmstead &…

Learn More

UPCOMING WEBINAR

Research Challenges for Large Pretrained Models

This webinar will highlight research challenges cutting across U.S. Army, Navy, and Air Force use cases for large pretrained models to include research on the following: multimodal models knowledge distillation for deployment at the edge continual learning model composition advanced reasoning capability A multitiered U.S. Department of Defense compute infrastructure for artificial intelligence research and…

Read More...

Current Landscape and Technologies of Binary Code Scanning Tools

This technical inquiry report provides information on the current landscape and technologies used to scan firmware samples for detection of cyber vulnerabilities.  The aim of this research is to identify and describe what binary code scanning (also called binary code analysis [BCA]) tools exist to scan firmware samples for the detection of cybervulnerabilities.  The Cybersecurity…

Read More...

New Enterprise Technical Procedures (ETP) Available in Support of Organizational File Share Migrations

FORT HUACHUCA, Ariz. — When trying to determine which organizational file share migration course of action (COA) may work best for your organization, check out the Planning and Preparation Enterprise Technical Procedures (ETPs), which includes pros and cons about the three migration methods and may be of use as you determine the best organizational file share…

Read More...
Sandia National Laboratories received a brain-based computing system from Intel Corp. that has 1.15 billion artificial neurons, aiming to advance large-scale brain-inspired computing. This innovative system, 10 times faster and denser than its predecessor, holds potential for various applications from scientific simulations to societal enhancements like smarter soldier gear and rapid medical diagnoses (photo by Craig Fritz).

1.15 Billion Artificial Neurons Arrive at Sandia, Setting Up House for Brain-Based Computing

ALBUQUERQUE, N.M. — In a groundbreaking stride toward the future of computing, early this year Sandia National Laboratories researchers welcomed the arrival of an extraordinary brain-based computing system called Hala Point. Packed with a staggering 1.15 billion artificial neurons — believed to be the biggest brain-based computing system in the world — and cleverly confined…

Read More...

ED 24-02: Mitigating the Significant Risk From Nation-State Compromise of Microsoft Corporate Email System

The Russian state-sponsored cyber actor known as Midnight Blizzard has exfiltrated email correspondence between Federal Civilian Executive Branch (FCEB) agencies and Microsoft through a successful compromise of Microsoft corporate email accounts. Microsoft has disclosed the incident and follow-up updates through multiple communications, beginning in January 2024: Microsoft Actions Following Attack by Nation State Actor Midnight Blizzard…

Read More...

CISA Announces Malware Next-Gen Analysis

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) announces a new release of our malware analysis system, called Malware Next-Gen, which allows any organization to submit malware samples and other suspicious artifacts for analysis. Malware Next-Gen allows CISA to more effectively support our partners by automating the analysis of newly identified malware and enhancing…

Read More...

NSA Publishes Guidance for Strengthening AI System Security

FORT MEADE, Md. – The National Security Agency (NSA) is releasing a Cybersecurity Information Sheet (CSI), “Deploying AI Systems Securely: Best Practices for Deploying Secure and Resilient AI Systems.” The CSI is intended to support National Security System owners and defense industrial base companies that will be deploying and operating AI systems designed and developed by…

Read More...

DoD Cyber Officials Detail Progress on Zero Trust Framework Roadmap

The U.S. Department of Defense (DoD) is on track to implement its zero trust cybersecurity framework by the end of fiscal year 2027, senior Pentagon information technology officials said. David McKeown, who serves as the DoD’s Deputy Chief Information Officer, underscored the significant progress the Department has made in implementing what he said will be…

Read More...

How can OneDrive files and e-mails be transferred from a us.af.mil account to a mail.mil account?

Read More...

Can you provide information and a government point of contact for the ChatSurfer software?

Read More...

UPCOMING EVENTS

Gartner Security & Risk Management Summit

In today’s rapidly evolving digital landscape, cybersecurity resilience underscores the importance of adapting and fortifying your organization’s defenses against an array of cyberthreats. Cybersecurity leaders must navigate a complex and ever-changing environment where cyberattacks can…

HammerCon 2024

HammerCon 2024 is a 1-day event located in Laurel, MD, on Thursday, May 16, 2024. This event, hosted by the Military Cyber Professionals Association, will allow an attendee to participate in one of three tracks…

2024 DAF Modeling and Simulation Summit

The theme of the 2024 U.S. Department of the Air Force (DAF) Modeling & Simulation (M&S) Summit is “Training in a Digital World,” which highlights DAF’s drive to upskill personnel through digital training. The goal…

IDGA Air Dominance Summit

The second annual IDGA Air Dominance Summit will build upon last year’s event and bring together over 200 senior U.S. and international leaders from the fighter aircraft community for an event focused on how allied…

RSA Conference 2024

The RSA Conference is a cyber-related event where industry professionals converge to learn, forge connections, and advance their careers. Throughout the 4-day conference, key talking points will include: Artificial intelligence DevSecOps Factor Analysis of Information…

Cyber Technology for National Security (CTNS) 2024

CTNS is a forum for presentation and discussion of research, prototyping, assessment, and operational uses of cyber technology in the interest of national security, with a focus on military and national mission systems. This program…

Voice From the Community

David, Michael 3_cropped select
Michael David

Ph.D.

Dr. David has served on the faculty of the National Intelligence University’s (NIU’s) School of Science and Technology Intelligence since February 2014. He teaches courses on cyber intelligence and information operations. He has a Ph.D. from Kyushu University, an M.S. from the University of Southern California, and a B.S. in industrial engineering from Lehigh University. Dr. David’s research emphasis is on cyber-physical systems, with a focus on hardware and software supply chain security.

Want to be featured in our Digest?

Submit your "Voice From the Community"