CYBERSECURITY

& Information Systems Digest

11 OCTOBER 2022

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

NSA Announces Date of the National Cryptologic Museum Grand Opening

FORT MEADE, Md. — The National Security Agency (NSA) is pleased to announce the Grand Opening of the National Cryptologic Museum. As NSA’s principal gateway to the public, the newly renovated museum will provide a unique opportunity to engage with cryptologic history in fresh and innovative ways – transporting visitors on a journey from the…

Read More...

Featured Notable Technical Inquiry

Security-Conscious Password Behavior From the End-User’s Perspective

Even though technical solutions for security problems are widespread, there are no adequate security measures against precarious user behavior.  Even if hashing and encrypting are used correctly in masking the passwords, attackers can bypass these strong points by going for the weakest link.  Most likely, this will happen through sharing a password, using an already leaked password, or creating a feasibly guessable password (Olmstead and…

Learn More

UPCOMING WEBINAR

man thinking with graphic of locks swirling around his head

CISA Adds Three Known Exploited Vulnerabilities to Catalog

CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog based on evidence of active exploitation: CVE-2024-1212 Progress Kemp LoadMaster OS Command Injection Vulnerability CVE-2024-0012 Palo Alto Networks PAN-OS Management Interface Authentication Bypass Vulnerability CVE-2024-9474 Palo Alto Networks PAN-OS Management Interface OS Command Injection Vulnerability Users and administrators are also encouraged to review…

Read More...
Heidi Massey (left), chief of U.S. Army Sustainment Command’s G6 (Information Management) directorate’s Program Management Division, meets with an employee in her division. The Program Management Division is responsible for ensuring compliance... (Sarah Ridenour)

Effective, Efficient Communication Enables Logistics Capabilities for the Warfighter

ROCK ISLAND ARSENAL, Ill. – How many times a day do you join a video conference, take a phone call, send an instant message, or respond to an email? None of these communication capabilities would be possible for the U.S. Army Sustainment Command workforce without the G6 (Information Management) directorate. ASC provides soldiers across the…

Read More...
line of computer terminals

Everything You Always Wanted to Know About Large Language Models for Science (But Were Afraid to Ask)

Chat-GPT, DALL-E and other artificial intelligence (AI) tools based on large language models (LLMs) are causing seismic shifts in the way people create and communicate. Users can interact with these ​“chat bot” LLMs by asking or typing a question in plain language rather than by learning a complicated computer code. And the results come nearly…

Read More...
man with headphones on standing next to computer terminal

Standing Guard Against Network Invaders

Anyone who has flown on a commercial flight, crossed an international border, visited a government building, or attended a concert knows you’re not getting inside until you pass the security guards. Placing guards outside the gates is a centuries-old defense strategy used to protect people, places, and things from those who seek to do harm….

Read More...
soldiers working at a computer

Teaching AI What It Should and Shouldn’t Do

Thanks to the rapid growth of large language models (LLMs), artificial intelligence (AI) agents have quickly been integrated into many facets of everyday life – from drafting documents to generating artwork to providing research assistance. But verifying the accuracy or appropriateness of an AI’s response is not always easy. For AI systems to be trusted…

Read More...
green connected network lines with NSA logo on it

NSA Issues Guidance for Using Trusted Platform Modules (TPMs)

FORT MEADE, Md. – The National Security Agency (NSA) is issuing guidance for using trusted platform modules (TPMs) to secure computing devices and harden the U.S. Department of Defense (DoD) enterprise infrastructure. A TPM is a security solution embedded in most enterprise computing systems. The TPM protects keys – associated with certificates created by vendors…

Read More...
A drone is used to get a closer look at intruders at the Blue Grass Army Depot in Richmond, Ky., Sept. 18, 2024. The depot is the only Defense Department installation testing the Scylla artificial-intelligence software to enhance physical security.

Defense Department Tests AI Software, Advances to Improve Physical Security Posture

Hours before dawn, under the veil of a new moon, two figures in military fatigues grapple like Greco-Roman wrestlers within the razor-wire perimeter of the Blue Grass Army Depot in Richmond, Kentucky. Their movements are rigid but discreet, each maneuvering for leverage beneath the orange glow of the floodlights lining the depot’s security fence. In…

Read More...
blue connected network lines with NSA logo on graphic

CISA, NSA, and Partners Issue Annual Report on Top Exploited Vulnerabilities

FORT MEADE, Md. – Malicious cyber actors are increasingly exploiting zero-day vulnerabilities to compromise enterprise networks, according to an annual Cybersecurity Advisory (CSA) about the top routinely exploited vulnerabilities coauthored by the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and domestic and foreign partners. The CSA, “2023 Top Routinely Exploited Vulnerabilities,”…

Read More...
Chetan_Honnenahalli headshot

Chetan Honnenahalli

Read More...
The Dashboard uses continually updated metrics, combined with colors indicating the level of readiness, to give detailed information as well as the big picture.

What free or low-cost enterprise data solutions with AI/ML are available and used in the DoD?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking to identify U.S. Department of Defense (DoD) enterprise data solutions that have artificial intelligence/machine-learning (AI/ML) capabilities; can support data analytics for decision making, train on previously observed data, display aggregations of data on demand through a dashboard or new views, and be deployed at…

Read More...

UPCOMING EVENTS

18th Annual Homeland Security Week

Join the Homeland Security community March 25-26 in the Washington, DC area for IDGA’s 18th iteration of the Homeland Security Week Summit, where leading experts and key decision-makers from DHS, DOJ, local law enforcement, and…

Emerging & Disruptive Technology for Defense 2025

Modernizing capability across battle areas calls for agility and the establishment of partnerships between military, industry, start-ups, international counterparts, and academia. The Emerging & Disruptive Technology (EDT) for Defense Conference will allow just that, bridging…

AOC 2024 International Symposium & Convention

From the Wars in Ukraine and Gaza to warfare in the Red Sea and tensions in the Indo-Pacific, the geopolitical situation is increasingly hostile, and tensions are increasing worldwide. Whether a nation-state is monitoring borders…

Rocky Mountain Cyberspace Symposium 2025 (RMCS25)

Welcome to the Rocky Mountain Cyberspace Symposium 2025 (RMCS25)! The Rocky Mountain Chapter of AFCEA is once again honored to invite you to the annual forum for industry, academia, and government to discuss and propose…

Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2024

The future is being built at an ever-accelerating rate, as generative AI is changing almost every aspect of organizations. Balancing value against resilience and risk is critical to modern success, as is transforming technology platforms….

Voice From the Community

David, Michael 3_cropped select
Michael David

Ph.D.

Dr. David has served on the faculty of the National Intelligence University’s (NIU’s) School of Science and Technology Intelligence since February 2014. He teaches courses on cyber intelligence and information operations. He has a Ph.D. from Kyushu University, an M.S. from the University of Southern California, and a B.S. in industrial engineering from Lehigh University. Dr. David’s research emphasis is on cyber-physical systems, with a focus on hardware and software supply chain security.

Want to be featured in our Digest?

Submit your "Voice From the Community"