Technical Research and Analysis Services

The Cybersecurity & Information Systems Information Analysis Center (CSIAC) is a component of the U.S. Department of Defense’s Information Analysis Center (IAC) enterprise.

What We Do

As a DoDIAC, we provide a number of resources and services to help you in your research and provide you with focused expert assistance and unbiased scientific and technical information.

Stay up to date with our Digest

Receive a digest of the latest in cybersecurity and information systems straight to your inbox

Recent Inquiries

Default Image

What approved commercial/government-off-the-shelf solutions can enhance cybersecurity on a learning management platform and protect personally identifiable information and other forms of controlled unclassified information?

What approved commercial/government-off-the-shelf solutions can enhance cybersecurity on a learning management platform and protect personally identifiable information and other forms of controlled unclassified information?

Members of the Colorado National Guard's Task Force Cyber help Colorado Secretary of State’s Office and Office of Information Technology to monitor network traffic and protect election infrastructure.

Bridging Cybersecurity Gaps in Small Business Security Operation Centers (SOCs) Using Artificial Intelligence (AI)-Enabled Tools

How are cybertools and cybertechnologies used in differentiating between automated reconnaissance and enumeration events as well as hands-on-keyboard events?

Default Image

Who in the U.S. Department of Defense has a suite of software tools to perform a detailed analysis and numerical simulations that can be employed to calculate radar cross section based on an unmanned aerial vehicle’s three-dimensional model?

Who in the U.S. Department of Defense has a suite of software tools to perform a detailed analysis and numerical simulations that can be employed to calculate radar cross section based on an unmanned aerial vehicle's three-dimensional model?

The DoD Cybersecurity Policy Chart

Captures the tremendous breadth of applicable cybersecurity policies in a helpful organizational scheme

Articles

Linear Accelerator Facility

Accelerating Qubit Testing With Cosmic Rays on Demand

Scientists at the Johns Hopkins Applied Physics Laboratory (APL) in Laurel, Maryland, have demonstrated a working capability that can radically accelerate the testing of qubits — the quantum computing equivalent of bits — accomplishing in…

Researchers at Pacific Northwest National Laboratory are helping scientists understand the strengths and limits of AI network models such as the MACE model, shown here, to predict which molecules will have desirable properties for practical uses. (Image by Shannon Colson | Pacific Northwest National Laboratory)

It’s Time to Get Comfortable With Uncertainty in AI Model Training

RICHLAND, Wash.—It’s obvious when a dog has been poorly trained. It doesn’t respond properly to commands. It pushes boundaries and behaves unpredictably. The same is true with a poorly trained artificial intelligence (AI) model. Only…

Journalist Catherine Herridge, right, interviews Akash Jain during a panel on artificial intelligence in national security during Special Operations Forces Week 2025 in Tampa, Fla., May 7, 2026.

Experts Say Special Ops Has Made Good AI Progress, But There’s Still Room to Grow

The United States’ special operations forces community has made commendable progress in embracing and integrating artificial intelligence into the battlespace over the past year, but it still has room to grow to keep pace with…

Ready to submit a technical inquiry?

Receive free information research on technical topics