CYBERSECURITY

& Information Systems Digest

5 NOVEMBER 2024

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

social media icons with network grid on top
SOCOM Social Media Smart Cards

People can easily get information about you through your online presence with a quick internet search. It is important to know what information about you is publicly available, and then decide what to do about unwanted information.

The U.S. Special Operations Command (SOCOM) has released SOCOM Social Media Smart Cards, a guide to help you evaluate your social media accounts and available data aggregator websites to determine if unwanted information is out there about you. The guide includes best safety practices for social networking platforms, digital ecosystems, and devices (i.e., fitness apps, smart phones, and gaming systems.)

Click here to view the SOCOM Social Media Smart Cards guide:

https://www.socom.mil/documents/ussocomsocialmediasmartcards.pdf

FEATURED ARTICLE

The U.S. Army Research Laboratory uses the “Shaker” to conduct experiments in multiaxial vibrations and develop technology to mitigate the danger it could cause to vehicles and structures, Sept. 26, 2019.

DoD Simplifies Process for Defense Contractors to Comply With Cybersecurity Rules

The Defense Department released for public inspection the final cybersecurity maturity model certification program rule. The rule includes changes which make it simpler for private sector companies to comply with the cybersecurity requirements that must be in place before they can bid on defense contracts. The Department’s cybersecurity maturity model certification program, also called CMMC,…

Read More...

Featured Notable Technical Inquiry

Current Landscape and Technologies of Binary Code Scanning Tools

This technical inquiry report provides information on the current landscape and technologies used to scan firmware samples for detection of cyber vulnerabilities.  The aim of this research is to identify and describe what binary code scanning (also called binary code analysis [BCA]) tools exist to scan firmware samples for the detection of cybervulnerabilities.  The Cybersecurity & Information Systems Information Analysis Center subject matter experts researched…

Learn More

FUTURE WEBINARS

CSIAC hosts live online technical presentations featuring a DoD research and engineering topic within our technical focus areas.

DID YOU MISS OUR LAST WEBINAR?

UPCOMING WEBINAR

shield

Responsible Artificial Intelligence (RAI) Toolkit DAGR and SHIELD

The Responsible Artificial Intelligence (RAI) Toolkit provides a voluntary process to identify, track, and improve alignment of AI projects to RAI best practices and the U.S. Department of Defense’s (DoD’s) AI ethical principles while capitalizing on opportunities for innovation.  It is intended to enable personnel working throughout an AI system’s life cycle to assess the system’s…

Read More...

UPCOMING EVENTS

2025 Department of the Air Force Modeling & Simulation (M&S) Summit

The goal of the M&S Summit is to gather U.S. Air Force and Space Force M&S experts to learn about new M&S initiatives and techniques, network across military services and with industry experts, and hear…

Smart Cities Connect Spring Conference & Expo

Smart cities have evolved from a futuristic vision into a tangible reality, creating a fundamental impact for people and the planet. From pilot projects that showcase innovative technologies to enduring infrastructure investments, smart city solutions…

Voice From the Community

Jeff West headshot
Jeff West

Solutions Architect Director, SAIC

Jeff West is a solutions architect director (SAIC’s Army Business Group) supporting the U.S. Army C5ISR Center’s Quick Reaction Capability and several C2 internal research and development efforts. He has supported several C5ISR ACAT I/II programs, as well as numerous RDT&E projects and programs, in requirements definition, developing technology roadmaps, onboarding new technologies, and implementing DevSecOps and Agile processes.

Want to be featured in our Digest?

Submit your "Voice From the Community"