Cybersecurity and Information Systems Digest

12 OCTOBER 21

Featured Technical Inquiry

Commercially Available Firewalls

This report provides an index of firewall tools as of May 2, 2011. It summarizes pertinent information and provides users with a brief description of available firewall tools and contact information. The written descriptions are based solely on vendors’ claims and intended only to highlight the capabilities and features of over 60 firewall products. Sources of available product evaluations are also identified.

Learn More
Michael Williams

Voice From the Community

MIchael G. Williams

Lead Senior Security Engineer, Joint Environment Toolset (JET), Raytheon Intelligence & Space

I am a technical staff member subject matter expert with nearly 25 years of expertise in systems, network, and security life cycle engineering and architecture. As a senior security engineer, I have supported several large infrastructure and system engineering and deployment projects, including engineering, deploying, and implementing all the security tools for a new DoD facility and engineering and deploying several security tools for a DoD on-prem private cloud solution. My background is in management information systems, telecommunications, and information assurance. I am an expert with several security tools, security techniques, risk assessments, accreditation, compliance, and Internet of Things security. I hold a Ph.D. in computer engineering.

Featured News

CISA Releases Secure Cloud Business Applications (SCuBA) Guidance Documents for Public Comment

CISA has released draft versions of two guidance documents—along with a request for comment (RFC)—that are a part of the recently launched Secure Cloud Business Applications (SCuBA) project: SCuBA Technical Reference Architecture (TRA) Extensible Visibility Reference Framework (eVRF) Program Guidebook The public comment period for the RFC guidance documents closes on May 19, 2022.

Learn More

Recent News

Army Junior ROTC Cyber Pilot to Help Bridge Cybersecurity Gap

Representatives from the U.S. Army, academia, and industry celebrated the kickoff of the Army Junior ROTC Cyber Pilot Program on the campus of the University of Alabama in Huntsville on April 26-27. Eleven schools from…

AFMC Utilizes MOATEL as Verification Resource

The Munition Open Architecture Test and Evaluation Laboratory (MOATEL) provides the independent verification missing from open architecture by validating models against real-world processes. Weapons Open System Architecture (WOSA) refers to platforms in which system interfaces…

Guide to Operational Technology (OT) Security

This initial public draft provides guidance on how to improve the security of OT systems while addressing their unique performance, reliability, and safety requirements. OT encompasses a broad range of programmable systems or devices that…

2021 Top Routinely Exploited Vulnerabilities

CISA, the National Security Agency (NSA), the Federal Bureau of Investigation (FBI), the Australian Cyber Security Centre (ACSC), the Canadian Centre for Cyber Security (CCCS), the New Zealand National Cyber Security Centre (NZ NCSC), and…

U.S. Department of Defense Hosts Ribbon-Cutting for 5G Smart Warehouse Network

The DoD 5G-NextG Initiative hosted a 5G Smart Warehouse Network ribbon-cutting ceremony at Naval Base Coronado last week. Developed in collaboration with Naval Information Warfare Center (NIWC) Pacific, Naval Supply Systems Command, Navy Region Southwest,…

Army Medical Logistics Participates in DoD AI Research and Development

CAMP CARROLL, Republic of Korea — U.S. Army Medical Materiel Center-Korea leaders participated in a virtual forum on March 4 that focused on how artificial intelligence (AI) could help improve the military’s operational medical supply…

Want to be featured in our biweekly digest?

Submit your "Voice From the Community"

Upcoming Events

Automotive Cybersecurity 2022

Join industry leaders as they provide best practices and solutions in overcoming automotive cybersecurity pain points with presentations centered on countering zero-day vulnerabilities, utilizing and securing OTA updates, methods to achieving time & cost-effective vulnerability…

Intelligent Automation Exchange

This event is on an invitation-only basis, though invitations may be requested through the website. It is designed for senior intelligent automation executives and will be attended by a number of Fortune 500 companies. The…

Joint C2 Summit

DSI’s 6th Annual Joint Command and Control (C2) Summit, previously the Joint Networks Summit, is a “Town-Hall” style discussion that will bring together members of the DoD, Military Services, allied nations, industry, and academia to…

Cybersecurity and Privacy Professionals Conference

The 2021 EDUCAUSE Cybersecurity and Privacy Professionals Conference, formerly the Security Professionals Conference, will focus on restoring, evolving, and transforming cybersecurity and privacy in higher education.

U.S. Air Force Cyberspace and Crypto

This invitation is open to all industry independent research and development (IR&D) participants, including large and medium-sized corporations, small businesses, academia, national labs, and federally funded research and development centers. This engagement has broad goals…

HammerCon

The 1st edition of HammerCon will feature fun things like Hacker Jeopardy and Capture the Flag, in addition to the main conference tracks: CORE (a.k.a. Cyber Operations Readiness & Experiences) is the main track in…

Demystifying Cybersecurity: Integrated Approaches to Developing Career Pathways

Proposed speakers will come from across industry, government, and academia. Conference tracks include: Growth and Development through Lifelong Learning Building a Three-Dimensional Cybersecurity Culture Hybrid Roles to Solve Sector-Specific Needs Emerging Topics in Cybersecurity