Cybersecurity

Cybersecurity (CS) (formerly referred to as information assurance [IA]) is defined as the technologies, processes, and practices designed for prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communication services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and non-repudiation.

Recent Inquiries

What Risk Management Framework and Authority to Operate use authorizations of extended reality technology are available within the U.S. Army/Department of Defense?

What Risk Management Framework and Authority to Operate use authorizations of extended reality technology are available within the U.S. Army/Department of Defense?

Can common access card certificates be extracted via application programming interface calls?

Can common access card certificates be extracted via application programming interface calls?

How are cybertools and cybertechnologies used in differentiating between automated reconnaissance and enumeration events and hands-on-keyboard events?

How are cybertools and cybertechnologies used in differentiating between automated reconnaissance and enumeration events and hands-on-keyboard events?

Articles

F
images of people circling a digital circle

CISA Updates Toolkit With Seven New Resources to Promote Public Safety Communications and Cyber Resiliency

The Cybersecurity and Infrastructure Security Agency (CISA) collaborates with public safety, national security, and emergency preparedness communities to enhance seamless and secure communications to keep America safe, secure, and resilient. Any interruption in communications can…

F
3MDEB Cyber Soldiers with Japanese partners during the Keen Sword 25 Cyber range at Sagami Depot, Japan. Keen Sword 25 took place from October 23 to November 1, 2024. (U.S. Army photo by 2nd Lt. Lucas Bires). (2nd Lt. Lucas Bires)

3rd MDTF Cyber Defenders Partner With Allies During Keen Sword 25

SAGAMI DEPOT, Japan — A cyber mission element from the Multi-Domain Effects Battalion (MDEB), 3rd Multi-Domain Task Force, partnered with joint and allied forces to conduct defensive cyber operations as part of Keen Sword 25…

F
man thinking with graphic of locks swirling around his head

CISA Adds Three Known Exploited Vulnerabilities to Catalog

CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog based on evidence of active exploitation: CVE-2024-1212 Progress Kemp LoadMaster OS Command Injection Vulnerability CVE-2024-0012 Palo Alto Networks PAN-OS Management Interface Authentication Bypass…

Webinars

hand writing on screen with AI written on it

A Multilayered Defense Strategy Against Adversarial AI Attack

In the digital era, the cybersecurity landscape faces an unprecedented challenge from adversarial attacks, which manipulate data and machine-learning (ML) algorithms to undermine security systems. These sophisticated threats pose significant risks across various sectors and…

A Framework for Evaluating National Cybersecurity Strategies

As governments seek to confront today’s complex and evolving threat landscape, they are experimenting with distinct approaches to safeguarding national cybersecurity. This webinar compares seven key countries’ national cybersecurity strategies to determine the most effective…

Is Cyberspace Becoming More Defensible and Resilient?

For over 50 years, the advantages in cyberspace have favored attackers, not defenders. Until the publication of the “U.S. National Cybersecurity Strategy” in 2023, it was never a goal to shift that advantage.  Cyber defense…

Events

A night-time image of a city overlayed with hexagonal indicators.

Critical Infrastructure Protection & Resilience North America

There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security,…

Illustration of a globe overlayed with Cyber Security.

2025 DoD Cybersecurity & SAP IT Summit

WELCOME to the 2025 Department of Defense Cybersecurity and Special Access Program (SAP) Information Technology (IT) Summit, where senior government leaders, industry leaders, and cybersecurity experts come together to exchange ideas, share knowledge, and shape…

AI Generated image of a holographic globe centered in a diagram of structures

Homeland Security Cybersecurity and Infrastructure Conference

The AFCEA Atlanta Chapter presents the next Homeland Security Cybersecurity and Infrastructure Conference in Atlanta, Georgia. AFCEA provides a meeting place for government, academia, and industry working in all disciplines in industry, service, government, military,…