Cybersecurity

Cybersecurity (CS) (formerly referred to as information assurance [IA]) is defined as the technologies, processes, and practices designed for prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communication services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and non-repudiation.

Recent Inquiries

What Risk Management Framework and Authority to Operate use authorizations of extended reality technology are available within the U.S. Army/Department of Defense?

What Risk Management Framework and Authority to Operate use authorizations of extended reality technology are available within the U.S. Army/Department of Defense?

Can common access card certificates be extracted via application programming interface calls?

Can common access card certificates be extracted via application programming interface calls?

How are cybertools and cybertechnologies used in differentiating between automated reconnaissance and enumeration events and hands-on-keyboard events?

How are cybertools and cybertechnologies used in differentiating between automated reconnaissance and enumeration events and hands-on-keyboard events?

Articles

F
CSA: Fast Flux: A National Security Threat (Image credit: NSA)

NSA and Partners Issue Guidance on Fast Flux as a National Security Threat

FORT MEADE, Md. – The National Security Agency (NSA) and partners are releasing the joint Cybersecurity Advisory (CSA), “Fast Flux:  A National Security Threat,” to warn about how cyber actors are using a technique called…

F
NICE Framework Work Role Categories

NICE Framework Components Version 2.0.0 – Changes & Updates

Did you know the NICE Workforce Framework for Cybersecurity (NICE Framework) version 2.0.0 was recently released? The NICE Framework establishes a standard approach and common language for describing cybersecurity work and learner capabilities. The NICE…

F
Privacy Framework wheel (Credit: N. Hanacek/NIST)

NIST Updates Privacy Framework, Tying It to Recent Cybersecurity Guidelines

How can society benefit from the use of personal data while also protecting individual privacy? Five years after debuting guidelines that can help organizations balance these goals, the National Institute of Standards and Technology (NIST)…

Webinars

profile of woman with graphics of charts swirling around her head

Current Guidance for Test and Evaluation of Artificial Intelligence

As the Defense Department accelerates incorporating artificial intelligence (AI) in all aspects of defense, the importance of rigorous test and evaluation (T&E) grows. In this webinar, contributors to the Developmental Test, Evaluation, and Assessment (DTE&A)…

A Journey From CRISP to ATLAS

This webinar presents an evolutionary approach in cybersecurity analytics, transitioning from the Cyber Readiness Inspection Statistics Platform (CRISP) to the Automated Threat Landscape Assessment System (ATLAS). CRISP initially revolutionized cybersecurity readiness by converting STIG-based Cyber…

city with cloud computing icon over it

Overview of CISA’s SCuBA Project

The Cybersecurity and Infrastructure Security Agency (CISA) developed the Secure Cloud Business Applications (SCuBA) project to provide reliable and accessible Cloud security configurations and assessment tools, improving security for Federal Civilian Executive Branch (FCEB) assets…

Events

training flyer

Cyber Training Range Course

COURSE REGISTRATION TO INCLUDE THE WAITLIST IS NOW COMPLETELY FULL. CSIAC is pleased to announce it is partnering with the Defense Acquisition University to offer the federal government and their contractors a Cyber Training Range…

A night-time image of a city overlayed with hexagonal indicators.

Critical Infrastructure Protection & Resilience North America

There are 16 critical infrastructure sectors whose assets, systems, and networks, whether physical or virtual, are considered so vital to the United States that their incapacitation or destruction would have a debilitating effect on security,…

Illustration of a globe overlayed with Cyber Security.

2025 DoD Cybersecurity & SAP IT Summit

Welcome to the 2025 Department of Defense (DoD) Cybersecurity and Special Access Program (SAP) Information Technology (IT) Summit, where senior government leaders, industry leaders, and cybersecurity experts come together to exchange ideas, share knowledge, and…