Apr 4, 2022 | Defense News, ND-ISAC Blog
In the white paper “Software Security Controls – Metrics Automation”, members of the National Defense Information Sharing and Analysis Center (ND-ISAC) complements the earlier series on Software Security Automation. This paper provides a roadmap to use the scan...
May 13, 2021 | ND-ISAC Blog
Application Security: Remediation Workflow Automation In their third whitepaper, “Remediation Workflow Automation” members of the National Defense Information Sharing and Analysis Center (ND-ISAC) present a multi-stage process intended to enforce comprehensive...
Feb 16, 2021 | ND-ISAC Blog
Did you know ND-ISAC hosts over 23 working groups focused on cyber operations, threat intelligence, compliance/risk management, and engineering? During the past three years the ND-ISAC working group program has evolved from meetings of peers, to collaborative work...
Jan 19, 2021 | ND-ISAC Blog
The National Defense Information Sharing and Analysis Center (ND-ISAC) is honored to announce that we will be offering an application threat modeling training series for our members. The ND-ISAC Application Security working group identified a subject matter expert to...
Dec 22, 2020 | ND-ISAC Blog, News
On December 14 (Mon) FireEye briefed its latest findings on the SolarWinds compromise and discovery of the SUNBURST malware to a ND-ISAC members-only webinar. The company provided the latest information, including guidance on how to detect this attack, and answered...
Dec 2, 2020 | ND-ISAC Blog, News
Written by ND-ISAC Application Security Working Group In “Software Security Automation: Security Controls Evaluation Criteria”, members of the National Defense Information Sharing and Analysis Center (ND-ISAC) offer a practical approach for any enterprise...