CYBERSECURITY

& Information Systems Digest

4 FEBRUARY 2025

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

https://www.biometricupdate.com/202104/bio-key-biometric-access-control-deal-expands-as-large-organizations-secure-remote-workers
KNOWN EXPLOITED VULNERABILITIES (KEV) CATALOG
For the benefit of the cybersecurity community and network defenders—and to help every organization better manage vulnerabilities and keep pace with threat activity—the Cybersecurity & Infrastructure Security Agency (CISA) maintains the authoritative source of vulnerabilities that have been exploited in the wild. Organizations should use the KEV catalog as an input to their vulnerability management prioritization framework.
​Click here to learn more:  ​https://www.cisa.gov/known-exploited-vulnerabilities-catalog.

FEATURED ARTICLE

CSI: Closing the Software Understanding Gap graphic

NSA Jointly Releases Recommendations for Closing the Software Understanding Gap

FORT MEADE, Md. – A report released by the National Security Agency (NSA), the Cybersecurity and Infrastructure Agency (CISA), the Defense Advanced Research Projects Agency (DARPA), and the Office of the Under Secretary of Defense for Research and Engineering (OUSD R&E) urges a national effort to better understand the behavior of software underpinning national security…

Read More...

Featured Notable Technical Inquiry

What is the operational system risk imposed by the infrastructure deployment pipeline workflow?

Real-time data monitoring of systems and system forensics is an essential aspect to keeping your data security platform safe when relying on the use of Infrastructure as Code (IaC) and the potential vulnerabilities associated with its continuous deployment (CD). Many organizations are facing an information overload and are inadequately prepared for understanding and designing a cyber incident response plan with near-real-time monitoring, including detection, analysis…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

Extended Reality for Maintenance and Repair Training

Extended reality (XR) is an all-encompassing term that groups three similar technologies:  (1) virtual reality (VR), (2) augmented reality (AR), and (3) mixed reality (MR). While XR is a field that has been in development in the U.S. Department of Defense (DoD) since the late 1960s, it has continued to see major advancements in recent…

Read More...

UPCOMING EVENTS

Public Sector Summit

Unlocking Data Power and AI Innovation in Government: Join Qlik’s annual, one-day event dedicated to empowering the Public Sector with the latest technology in data analytics, data quality, artificial intelligence (AI) and decision intelligence. Discover…

TechNet Emergence 2025

Join the TechNet Emergence 2025 conference on July 15-16, at the Hyatt Regency in Reston, Virginia, as the following topics, which have been chosen for their alignment with national priorities and cross-sector innovation opportunities, will…

Black Hat USA 2025

Black Hat USA returns to the Mandalay Bay Convention Center in Las Vegas with a 6-day program. The event will open with four days of specialized cybersecurity Trainings (August 2-5), with courses for all skill…

Voice From the Community

Dave_Pekala_Headshot
David Pekala, MBA, PMP, GCIH, GSEC

Technical Director, NextGen Federal Systems, LLC

Dave Pekala supports the Army Analytics Solution to Establish Real-Time Operational Information Dominance Unified Data Reference Architecture effort as a data and Zero Trust subject matter expert. His focus is on information domination, digital transformation with DevSecOps, the StratusML platform for artificial intelligence, and Army intelligence systems.
ractices with digital engineering, including advanced modeling and simulation services supporting Joint Simulation Environment for weather effects.

Want to be featured in our Digest?

Submit your "Voice From the Community"