CYBERSECURITY

& Information Systems Digest

3 DECEMBER 2024

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

CISA logo with internet, wifi, search icons around it
CISA Launches New Learning Platform to Enhance Training and Education U.S. Veterans and Other Stakeholders

The Cybersecurity and Infrastructure Security Agency (CISA) announced the launch of CISA Learning, a learning management system that will modernize training and education for its employees and key stakeholders. This transformative platform is a critical component of CISA’s ongoing efforts to streamline and enhance its enterprise learning environment, ensuring the same training available to CISA personnel is also available free of charge to the nation’s veterans and partners from federal, state, local, tribal, and territorial levels of government.

Learn more here:  CISA Learning

FEATURED ARTICLE

blue connected network lines with NSA logo on graphic

CISA, NSA, and Partners Issue Annual Report on Top Exploited Vulnerabilities

FORT MEADE, Md. – Malicious cyber actors are increasingly exploiting zero-day vulnerabilities to compromise enterprise networks, according to an annual Cybersecurity Advisory (CSA) about the top routinely exploited vulnerabilities coauthored by the Cybersecurity and Infrastructure Security Agency (CISA), the National Security Agency (NSA), and domestic and foreign partners. The CSA, “2023 Top Routinely Exploited Vulnerabilities,”…

Read More...

Featured Notable Technical Inquiry

Security-Conscious Password Behavior From the End-User’s Perspective

Even though technical solutions for security problems are widespread, there are no adequate security measures against precarious user behavior.  Even if hashing and encrypting are used correctly in masking the passwords, attackers can bypass these strong points by going for the weakest link.  Most likely, this will happen through sharing a password, using an already leaked password, or creating a feasibly guessable password (Olmstead and…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

hand writing on screen with AI written on it

A Multilayered Defense Strategy Against Adversarial AI Attack

In the digital era, the cybersecurity landscape faces an unprecedented challenge from adversarial attacks, which manipulate data and machine-learning (ML) algorithms to undermine security systems. These sophisticated threats pose significant risks across various sectors and challenge traditional defense mechanisms. This study introduces a multilayered defense strategy designed to counter these advanced threats, focusing on the…

Read More...

UPCOMING EVENTS

ISC2 Security Congress 2025

The 13th annual ISC2 Security Congress will be hosted live at the Gaylord Opryland Nashville, along with a hybrid virtual option. The keynote session will feature Phil Venables, the Strategic Security Advisor at Google. There…

TechNet Emergence 2025

Join the TechNet Emergence 2025 conference on July 15-16 at the Hyatt Regency in Reston, Virginia, as the following topics, which have been chosen for their alignment with national priorities and cross-sector innovation opportunities, will…

Black Hat USA 2025

Black Hat USA returns to the Mandalay Bay Convention Center in Las Vegas with a six-day program. The event will open with four days of specialized cybersecurity training (August 2-5), with courses for all skill…

Voice From the Community

Chetan_Honnenahalli headshot
Chetan Honnenahalli

Software Developer

Chetan Honnenahalli has over 15 years of software development experience specializing in privacy-preserving infrastructure, identity theft and financial fraud protection, and identity access management architecture at various companies including Meta, Zoom, and American Express Global Business Travel. His work focuses on creating secure and reliable systems to enhance user safety and privacy.

Want to be featured in our Digest?

Submit your "Voice From the Community"