Cybersecurity

Cybersecurity (CS) (formerly referred to as information assurance [IA]) is defined as the technologies, processes, and practices designed for prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communication services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and non-repudiation.

Recent Inquiries

Who can provide information on getting approval to use something like NotebookLM on closed-loop U.S. Department of Defense computers?

Who can provide information on getting approval to use something like NotebookLM on closed-loop U.S. Department of Defense computers?

Can information be provided on methods to efficiently improve commercial-off-the-shelf (COTS) information and communication technology (ICT) products for cybersecurity risks?

Can information be provided on methods to efficiently improve commercial-off-the-shelf (COTS) information and communication technology (ICT) products for cybersecurity risks?

What Risk Management Framework and Authority to Operate use authorizations of extended reality technology are available within the U.S. Army/Department of Defense?

What Risk Management Framework and Authority to Operate use authorizations of extended reality technology are available within the U.S. Army/Department of Defense?

Articles

F
Control Environment Laboratory Exercise (CELR) Exercise (Image source: CISA)

CISA, DHS S&T, INL, LSU Help Energy Industry Partners Strengthen Incident Response and OT Cybersecurity

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS) Science and Technology Directorate (S&T), and Idaho National Laboratory (INL) recently hosted Louisiana State University (LSU) and several energy industry and…

F
CSA: Fast Flux: A National Security Threat (Image credit: NSA)

NSA and Partners Issue Guidance on Fast Flux as a National Security Threat

FORT MEADE, Md. – The National Security Agency (NSA) and partners are releasing the joint Cybersecurity Advisory (CSA), “Fast Flux:  A National Security Threat,” to warn about how cyber actors are using a technique called…

F
NICE Framework Work Role Categories

NICE Framework Components Version 2.0.0 – Changes & Updates

Did you know the NICE Workforce Framework for Cybersecurity (NICE Framework) version 2.0.0 was recently released? The NICE Framework establishes a standard approach and common language for describing cybersecurity work and learner capabilities. The NICE…

Webinars

profile of woman with graphics of charts swirling around her head

Current Guidance for Test and Evaluation of Artificial Intelligence

As the Defense Department accelerates incorporating artificial intelligence (AI) in all aspects of defense, the importance of rigorous test and evaluation (T&E) grows. In this webinar, contributors to the Developmental Test, Evaluation, and Assessment (DTE&A)…

A Journey From CRISP to ATLAS

This webinar presents an evolutionary approach in cybersecurity analytics, transitioning from the Cyber Readiness Inspection Statistics Platform (CRISP) to the Automated Threat Landscape Assessment System (ATLAS). CRISP initially revolutionized cybersecurity readiness by converting STIG-based Cyber…

city with cloud computing icon over it

Overview of CISA’s SCuBA Project

The Cybersecurity and Infrastructure Security Agency (CISA) developed the Secure Cloud Business Applications (SCuBA) project to provide reliable and accessible Cloud security configurations and assessment tools, improving security for Federal Civilian Executive Branch (FCEB) assets…

Events

An image of an opened padlock with an overlay of circuits

ISC2 Security Congress 2025

The 13th annual ISC2 Security Congress will be hosted live at the Gaylord Opryland Nashville, along with a hybrid virtual option. The keynote session will feature Phil Venables, the Strategic Security Advisor at Google. There…

Illustration of transparent people with circuit board overlays

TechNet Emergence 2025

Join the TechNet Emergence 2025 conference on July 15-16 at the Hyatt Regency in Reston, Virginia, as the following topics, which have been chosen for their alignment with national priorities and cross-sector innovation opportunities, will…

Illustration of a person in a black hat overlayed on circuits.

Black Hat USA 2025

Black Hat USA returns to the Mandalay Bay Convention Center in Las Vegas with a six-day program. The event will open with four days of specialized cybersecurity training (August 2-5), with courses for all skill…