Cybersecurity

Cybersecurity (CS) (formerly referred to as information assurance [IA]) is defined as the technologies, processes, and practices designed for prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communication services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and non-repudiation.

Recent Inquiries

Long-term goals for the Communications-Electronics Command (CECOM) Software Engineering Center (SEC) include incorporating Zero Trust further into Army and DOD systems and developing workforce training programs around the organization’s methodology.

Open Standards That Support Zero Trust Implementation

What open standards apply to zero trust implementation?

Are there any active, ongoing kill chain/web simulations using U.S. Army-validated red-threat communication or C3/4 digital-twin models utilizing the Advanced Framework for Simulation, Integration, and Modeling; Integrated Threat Analysis and Simulation Environment; or Overarching Dynamic Electronic-Warfare System Standard Architecture?

Are there any active, ongoing kill chain/web simulations using U.S. Army-validated red-threat communication or C3/4 digital-twin models utilizing the Advanced Framework for Simulation, Integration, and Modeling; Integrated Threat Analysis and Simulation Environment; or Overarching Dynamic Electronic-Warfare System Standard Architecture?

How do the origin, integrity, and substitutability of intellectual property blocks in communications hardware affect firmware security and trustworthiness?

How do the origin, integrity, and substitutability of intellectual property blocks in communications hardware affect firmware security and trustworthiness?

Articles

F
An Air Force MQ-9 Reaper remotely piloted aircraft, assigned to the 432nd Wing, taxis toward the runway at Creech Air Force Base, Nev., April 15, 2025.

DARPA Calls on Industry to Assist With Improving, Strengthening DoD Cybersecurity

The Defense Advanced Research Projects Agency announced a Resilient Software Systems Accelerator program to kick-start the widespread adoption of math-based software development practices to make military systems inherently more secure against cyberthreats. During the Resilient…

F
image of a computer screen with code on it and a person's hands typing on a keyboard superimposed on top

NSA and CISA Release CSI Highlighting Importance of Memory Safe Languages in Software Security

FORT MEADE, Md. – The National Security Agency and the Cybersecurity and Infrastructure Security Agency (CISA) have released a joint Cybersecurity Information Sheet (CSI) to highlight the importance of adopting memory-safe languages (MSLs) in improving…

F
Hacking isometric illustration with infected server and laptops 3d

Microsoft Releases Guidance on Exploitation of SharePoint Vulnerability (CVE-2025-53770)

The Cybersecurity and Infrastructure Security Agency (CISA) is aware of active exploitation of a new remote code execution (RCE) vulnerability enabling unauthorized access to on-premise SharePoint servers. While the scope and impact continue to be…

Webinars

avoid risk reduce transfer

Connecting With Cyber: Developing an Enterprise Risk Program

COMING SOON – EXACT DATE AND TIME TBD. This discussion provides the attendees with a sense of how to construct a holistic risk management program. This includes the development of a governance structure, risk appetite statement,…

Deceptive AI: Understanding and Defending Against the Next Generation of Cyber Weapons

COMING SOON – EXACT DATE AND TIME TBD. In the evolving theater of modern warfare, artificial intelligence (AI) has emerged as a transformative force and new frontier of vulnerabilities. This presentation provides a critical analysis of…

Satellite Cybersecurity

As satellites become integral to global communications, navigation, and defense, they are increasingly targeted by advanced cyberthreats. Cybersecurity in cyberspace is a versatile field dedicated to safeguarding digital information and infrastructure from a spectrum of…

Events

graphic of soldier holding digital world

Emerging Technologies for Defense Conference & Exhibition

Explore the innovations that will help shape national security for the next century at NDIA’s flagship Emerging Technologies Conference! Hear directly from technology leaders in government, defense industry, the commercial sector, and academia on cutting-edge…

A hand overlayed by a virtual padlock and the words "Cyber security".

National Cyber Summit

National Cyber Summit is an innovative cybersecurity-technology event, offering educational, collaborative, and workforce development opportunities for industry visionaries and rising leaders. NCS provides diverse focus areas, speakers, and accessibility. Held in Huntsville, Alabama, the Summit…

AI Generated image of a holographic globe centered in a diagram of structures

ADEC 2025

ADEC enables leaders of the national security analysis community to strengthen existing partnerships, seed new ones, and share strategies and best practices across sectors. Attendees represent the U.S. military, government, intelligence community, industry stakeholders, university-affiliated…