Cybersecurity

Cybersecurity (CS) (formerly referred to as information assurance [IA]) is defined as the technologies, processes, and practices designed for prevention of damage to, protection of, and restoration of computers, electronic communications systems, electronic communication services, wire communication, and electronic communication, including information contained therein, to ensure its availability, integrity, authentication, confidentiality, and non-repudiation.

Recent Inquiries

What efforts are currently being worked for quantum antennas on U.S. Department of Defense platforms?

What efforts are currently being worked for quantum antennas on U.S. Department of Defense platforms?

What software/middleware creates virtual and constructive cyber effects in live, virtual, and constructive testing and training events?

What software/middleware creates virtual and constructive cyber effects in live, virtual, and constructive testing and training events?

Guaranteeing AI Robustness against Deception (GARD)

Counter-AI Offensive Tools and Techniques

What is the state of industry investment in and development of products in support of counter-artificial intelligence offensive tools and techniques?

Articles

F
This is a complicated hybrid network with multiple vulnerabilities, and you can’t just protect it with a simple firewall the way you would if all your assets were inside the Head Office. Zero trust architectures can help. (Credit: N. Hanacek/NIST)

NIST Offers 19 Ways to Build Zero Trust Architectures

If you’re trying to secure your organization’s computer network from cyberattacks, traditional approaches may not work. Gone are the days when you could keep all your electronic assets inside a single building and construct a…

F
The U.S. Air Force MQ-9A operates from a flight test facility in the continental United States. Source: U.S. Air Force

Accelerating Cyber Resilience: Air Force, DARPA Join Forces to Strengthen Cyber Defenses

A strong, lethal military demands cutting-edge and resilient software to power every weapon and support system our U.S. Warfighters depend on. However, the U.S. Department of Defense’s (DoD’s) reliance on aging IT infrastructure, using security…

F
Control Environment Laboratory Exercise (CELR) Exercise (Image source: CISA)

CISA, DHS S&T, INL, LSU Help Energy Industry Partners Strengthen Incident Response and OT Cybersecurity

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS) Science and Technology Directorate (S&T), and Idaho National Laboratory (INL) recently hosted Louisiana State University (LSU) and several energy industry and…

Webinars

Satellite Cybersecurity

As satellites become integral to global communications, navigation, and defense, they are increasingly targeted by advanced cyberthreats. Cybersecurity in cyberspace is a versatile field dedicated to safeguarding digital information and infrastructure from a spectrum of…

Assessing DoD Mission Resilience: A Guide to Cyber DT&E

This webinar provides takeaways for applying the brand-new DoD Cyber Developmental Test & Evaluation (DT&E) Guidebook Version 3. Topics covered will include the following: An introduction to the DoD Cyber DT&E Guidebook (Version 3) Exploring…

profile of woman with graphics of charts swirling around her head

Current Guidance for Test and Evaluation of Artificial Intelligence

As the Defense Department accelerates incorporating artificial intelligence (AI) in all aspects of defense, the importance of rigorous test and evaluation (T&E) grows. In this webinar, contributors to the Developmental Test, Evaluation, and Assessment (DTE&A)…

Events

An image of an opened padlock with an overlay of circuits

ISC2 Security Congress 2025

The 13th annual ISC2 Security Congress will be hosted live at the Gaylord Opryland Nashville, along with a hybrid virtual option. The keynote session will feature Phil Venables, the Strategic Security Advisor at Google. There…

Illustration of transparent people with circuit board overlays

TechNet Emergence 2025

Join the TechNet Emergence 2025 conference on July 15-16 at the Hyatt Regency in Reston, Virginia, as the following topics, which have been chosen for their alignment with national priorities and cross-sector innovation opportunities, will…

Illustration of a person in a black hat overlayed on circuits.

Black Hat USA 2025

Black Hat USA returns to the Mandalay Bay Convention Center in Las Vegas with a six-day program. The event will open with four days of specialized cybersecurity training (August 2-5), with courses for all skill…