News & Updates

The information in this section includes discussion of new attacks, technologies, or controversies of interest to the information assurance and security community. We encourage interactivity in the discussion and ask that you participate and that you share the link with anyone who may have something to contribute to the conversation. Send any suggestions for items to or

Scholarship for Women Studying Information Security

Posted on by Mary Brown


Since 2011, ACSA has provided scholarships to women studying for their B.S. and M.S. degrees in fields relating to information security.  These $5000 to $10,000 scholarships provide assistance to women at formative stages of their careers.  With the addition of HP’s multi-year financial commitment to this program starting with the 2014-15 academic year, ACSA will be able to increase the number of scholarships, in turn helping to increase the number of women in the field.

Also new for the 2014-15 academic year, the Committee on the Status of Women in Computing Research (CRA-W), an arm of the Computing Research Alliance, is joining the SWSIS program.  CRA-W will participate in SWSIS publicity and in selecting scholarship winners through their extensive network of faculty members in the field.

Use the link below for more information about applying for the scholarship.


RSA conference controversy

Posted on by Mary Brown

The RSA conference, which has typically been one of the hottest security conferences held each year, has been embroiled in controversy since the Snowden revelation that RSA was working with the NSA to compromise some encryption functionality.  Some speakers chose to cancel their presentations and others decided to attend and protest as their response to these accusations.  Stephen Colbert addressed his reasons for choosing to show up and address the crowd.  If you are interested in his rather amusing, if a bit controversial, comments, see the link below.



CISSE – Call For Papers

Posted on by Mary Brown

The Colloquium for Information Systems Security Education has posted a call for papers to be submitted in relationship with their conference in San Diego in June. Paper submission deadline is March 15th, 2014. Details are in the link below:

NSA information security research paper competition

Posted on by Mary Brown

The NSA is holding a competition for authors of information security focused research papers. See the attached document for details. NSA_paper_compads-12.20

Intelligence Community Virtual Career Fair

Posted on by Mary Brown

On February 26, 2014, the Intelligence Community (IC) will be hosting a Virtual Career Fair. Those interested will be able to explore career opportunities, chat with recruiters and subject matter experts, and learn how to apply for job openings.

Participating IC Agencies include:
· Central Intelligence Agency (CIA)
· Federal Bureau of Investigation Language Services Section (FBI LSS)
· National Geospatial-Intelligence Agency (NGA)
· National Security Agency (NSA)
· National Virtual Translation Center (NVTC)
· Office of the Director of National Intelligence (ODNI)

For more information or to register for this event, please visit:

NIST Framework 1.0 and Road Map

Posted on by Mary Brown

Today NIST published their Critical Infrastructure Security Framework 1.0 and an associated Road Map for how they view the evolution of the framework advancing over the near future. Share your thoughts.

Alumni Association February 2014 Event

Posted on by Mary Brown

The Minnesota Schools IT student and alumni association is holding their February 2014 event in St. Paul on February 11th at 5:30. If you are interested in attending go to the URL below to register.

Session Title:

Emerging technologies and YOU! What does it mean to be an IT pro in 2014?

Featured Speaker is:

Ryan Carlson, Technology Evangelist and Co-President, The Nerdery

Register at:

ISC2 foundation scholarships

Posted on by Mary Brown

The ISC2 foundation offers a number of scholarships in the field of Information Assurance and Security. See the info at the link below if you are interested:

NIST proposes security infrastructure framework

Posted on by Mary Brown

NIST has a proposal for a framework that public and private entities would follow in order to create a secure infrastructure.  They are looking for comments so if you have an interest in how these rules turn out, I encourage you to get involved.


Bruce Schneier on taking back the Internet

Posted on by Mary Brown

Bruce Schneier, creator of some of the earlier encryption methodologies, has posted an interesting discussion about changes needed to restore trust in the concept of encryption that has taken some hard hits lately.


← Older posts Newer posts →