CYBERSECURITY

& Information Systems Digest

21 SEPTEMBER 21

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

Mobile Application Single Sign-on for First Responders: Final Guide Published

On-demand access to public safety data is critical to ensuring that public safety and first responder (PSFR) personnel can deliver the proper care and support during an emergency. This necessitates heavy reliance on mobile platforms while in the field, which may be used to access sensitive information. However, complex authentication requirements can hinder the process…

Read More...

Featured Notable Technical Inquiry

man thinking with graphic of locks swirling around his head

CISA Adds Three Known Exploited Vulnerabilities to Catalog

CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog based on evidence of active exploitation: CVE-2024-1212 Progress Kemp LoadMaster OS Command Injection Vulnerability CVE-2024-0012 Palo Alto Networks PAN-OS Management Interface Authentication Bypass Vulnerability CVE-2024-9474 Palo Alto Networks PAN-OS Management Interface OS Command Injection Vulnerability Users and administrators are also encouraged to review the Palo Alto Threat Brief:  Operation Lunar Peek related to…

Learn More
Heidi Massey (left), chief of U.S. Army Sustainment Command’s G6 (Information Management) directorate’s Program Management Division, meets with an employee in her division. The Program Management Division is responsible for ensuring compliance... (Sarah Ridenour)

Effective, Efficient Communication Enables Logistics Capabilities for the Warfighter

ROCK ISLAND ARSENAL, Ill. – How many times a day do you join a video conference, take a phone call, send an instant message, or respond to an email? None of these communication capabilities would be possible for the U.S. Army Sustainment Command workforce without the G6 (Information Management) directorate. ASC provides soldiers across the globe with the right equipment at the right place and…

Learn More
line of computer terminals

Everything You Always Wanted to Know About Large Language Models for Science (But Were Afraid to Ask)

Chat-GPT, DALL-E and other artificial intelligence (AI) tools based on large language models (LLMs) are causing seismic shifts in the way people create and communicate. Users can interact with these ​“chat bot” LLMs by asking or typing a question in plain language rather than by learning a complicated computer code. And the results come nearly instantaneously. But we’ve only scratched the surface of what this…

Learn More
man with headphones on standing next to computer terminal

Standing Guard Against Network Invaders

Anyone who has flown on a commercial flight, crossed an international border, visited a government building, or attended a concert knows you’re not getting inside until you pass the security guards. Placing guards outside the gates is a centuries-old defense strategy used to protect people, places, and things from those who seek to do harm. Like those guards, Idaho National Laboratory’s (INL’s) newest network anomaly…

Learn More
soldiers working at a computer

Teaching AI What It Should and Shouldn’t Do

Thanks to the rapid growth of large language models (LLMs), artificial intelligence (AI) agents have quickly been integrated into many facets of everyday life – from drafting documents to generating artwork to providing research assistance. But verifying the accuracy or appropriateness of an AI’s response is not always easy. For AI systems to be trusted partners with humans in situations where safe and ethical decisions…

Learn More
green connected network lines with NSA logo on it

NSA Issues Guidance for Using Trusted Platform Modules (TPMs)

FORT MEADE, Md. – The National Security Agency (NSA) is issuing guidance for using trusted platform modules (TPMs) to secure computing devices and harden the U.S. Department of Defense (DoD) enterprise infrastructure. A TPM is a security solution embedded in most enterprise computing systems. The TPM protects keys – associated with certificates created by vendors and manufacturers – which are used during acceptance testing and…

Learn More
A drone is used to get a closer look at intruders at the Blue Grass Army Depot in Richmond, Ky., Sept. 18, 2024. The depot is the only Defense Department installation testing the Scylla artificial-intelligence software to enhance physical security.

Defense Department Tests AI Software, Advances to Improve Physical Security Posture

Hours before dawn, under the veil of a new moon, two figures in military fatigues grapple like Greco-Roman wrestlers within the razor-wire perimeter of the Blue Grass Army Depot in Richmond, Kentucky. Their movements are rigid but discreet, each maneuvering for leverage beneath the orange glow of the floodlights lining the depot’s security fence. In the distance, a patrolling sentry squints, straining to make sense…

Learn More
blue connected network lines with NSA logo on graphic

CISA, NSA, and Partners Issue Annual Report on Top Exploited Vulnerabilities

FORT MEADE, Md. – Malicious cyber actors are increasingly exploiting zero-day vulnerabilities to compromise enterprise networks, according to an annual Cybersecurity Advisory (CSA) about the top routinely exploited vulnerabilities coauthored by the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and domestic and foreign partners. The CSA, “2023 Top Routinely Exploited Vulnerabilities,” details the top 15 Common Vulnerabilities and Exposures (CVEs) collected…

Learn More
Chetan_Honnenahalli headshot

Chetan Honnenahalli

Learn More
The Dashboard uses continually updated metrics, combined with colors indicating the level of readiness, to give detailed information as well as the big picture.

What free or low-cost enterprise data solutions with AI/ML are available and used in the DoD?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking to identify U.S. Department of Defense (DoD) enterprise data solutions that have artificial intelligence/machine-learning (AI/ML) capabilities; can support data analytics for decision making, train on previously observed data, display aggregations of data on demand through a dashboard or new views, and be deployed at multiple classification levels (unclassified, CUI, secret, etc.); and are free…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

Network Survivability Assessment Methodology

Hosted by: Philip Payne

September 22, 2021 12:00 pm
DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Network Survivability Assessment Methodology

This presentation describes a network survivability assessment methodology for Cyber-Electromagnetic Activities teams to identify cyber threats early in the acquisition cycle. The U.S. Department of Defense Acquisition Process begins with a Material Solution Analysis (MSA) and culminates with operations and support.  An Analysis of Alternatives (AoA) takes place after all potential solutions are examined to…

Read More...

UPCOMING EVENTS

18th Annual Homeland Security Week

Join the Homeland Security community March 25-26 in the Washington, DC area for IDGA’s 18th iteration of the Homeland Security Week Summit, where leading experts and key decision-makers from DHS, DOJ, local law enforcement, and…

Emerging & Disruptive Technology for Defense 2025

Modernizing capability across battle areas calls for agility and the establishment of partnerships between military, industry, start-ups, international counterparts, and academia. The Emerging & Disruptive Technology (EDT) for Defense Conference will allow just that, bridging…

AOC 2024 International Symposium & Convention

From the Wars in Ukraine and Gaza to warfare in the Red Sea and tensions in the Indo-Pacific, the geopolitical situation is increasingly hostile, and tensions are increasing worldwide. Whether a nation-state is monitoring borders…

Rocky Mountain Cyberspace Symposium 2025 (RMCS25)

Welcome to the Rocky Mountain Cyberspace Symposium 2025 (RMCS25)! The Rocky Mountain Chapter of AFCEA is once again honored to invite you to the annual forum for industry, academia, and government to discuss and propose…

Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2024

The future is being built at an ever-accelerating rate, as generative AI is changing almost every aspect of organizations. Balancing value against resilience and risk is critical to modern success, as is transforming technology platforms….

Voice From the Community

Jess Irwin

Technical Staff, Multimission Cyber Security, Raytheon Intelligence & Space

As a technical staff member subject matter expert, Jess provides nearly 50 years of expertise in systems, software, and whole life engineering. As a systems architect, he has supported several of the largest weapons systems platforms, including the F-35 and B-2. His back-ground in mathematics and physics provides insight into subtle issues related to communications and sensor technologies. He has developed operat-ing systems, compilers, and large-scale systems emulations and is an experi-enced 3-D game developer. He has a foundational patent in distributed trust architecture and collaborated on Trusted Computing Architecture and Intellectual Property Protection techniques. He is an expert in the tools, techniques, and practices of model-based systems engineering using SysML.

Want to be featured in our Digest?

Submit your "Voice From the Community"