Cybersecurity

Cybersecurity (CS) (formerly referred to as information assurance [IA]) is defined as the technologies, processes, and practices designed for prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communication services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and non-repudiation.

Recent Inquiries

Who can provide information on getting approval to use something like NotebookLM on closed-loop U.S. Department of Defense computers?

Who can provide information on getting approval to use something like NotebookLM on closed-loop U.S. Department of Defense computers?

Can information be provided on methods to efficiently improve commercial-off-the-shelf (COTS) information and communication technology (ICT) products for cybersecurity risks?

Can information be provided on methods to efficiently improve commercial-off-the-shelf (COTS) information and communication technology (ICT) products for cybersecurity risks?

What Risk Management Framework and Authority to Operate use authorizations of extended reality technology are available within the U.S. Army/Department of Defense?

What Risk Management Framework and Authority to Operate use authorizations of extended reality technology are available within the U.S. Army/Department of Defense?

Articles

F
digital airplane superimposed over conference meeting

Supporting International Partners in Aviation Cybersecurity

As companies worldwide switch from analog to automated digital industrial control systems, malicious cyber actors are finding new opportunities for extortion and mayhem. It’s happening in a range of industrial settings, from power stations to…

F
CISA Secure by Design logo

Secure by Design Alert: Eliminating Buffer Overflow Vulnerabilities

Buffer overflow vulnerabilities are a prevalent type of memory safety software design defect that regularly leads to system compromise. The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) recognize that memory…

F
program-red-c-logo

Watch Out for the Bus!

In an imperfect world, the prospect of having a computer, or any bus-based system, that can defend itself from cyber-attacks and recover from one is not just a pipe dream. DARPA experts say this capability…

Webinars

city with cloud computing icon over it

Overview of CISA’s SCuBA Project

The Cybersecurity and Infrastructure Security Agency (CISA) developed the Secure Cloud Business Applications (SCuBA) project to provide reliable and accessible Cloud security configurations and assessment tools, improving security for Federal Civilian Executive Branch (FCEB) assets…

hand writing on screen with AI written on it

A Multilayered Defense Strategy Against Adversarial AI Attack

In the digital era, the cybersecurity landscape faces an unprecedented challenge from adversarial attacks, which manipulate data and machine-learning (ML) algorithms to undermine security systems. These sophisticated threats pose significant risks across various sectors and…

A Framework for Evaluating National Cybersecurity Strategies

As governments seek to confront today’s complex and evolving threat landscape, they are experimenting with distinct approaches to safeguarding national cybersecurity. This webinar compares seven key countries’ national cybersecurity strategies to determine the most effective…

Events

A night-time image of a city overlayed with hexagonal indicators.

Critical Infrastructure Protection & Resilience North America

There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security,…

Illustration of a globe overlayed with Cyber Security.

2025 DoD Cybersecurity & SAP IT Summit

Welcome to the 2025 Department of Defense (DoD) Cybersecurity and Special Access Program (SAP) Information Technology (IT) Summit, where senior government leaders, industry leaders, and cybersecurity experts come together to exchange ideas, share knowledge, and…

AI Generated image of a holographic globe centered in a diagram of structures

Homeland Security Cybersecurity and Infrastructure Conference

The AFCEA Atlanta Chapter presents the next Homeland Security Cybersecurity and Infrastructure Conference in Atlanta, Georgia. AFCEA provides a meeting place for government, academia, and industry working in all disciplines in industry, service, government, military,…