CYBERSECURITY

& Information Systems Digest

11 OCTOBER 2022

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

FEATURED ARTICLE

NSA Announces Date of the National Cryptologic Museum Grand Opening

FORT MEADE, Md. — The National Security Agency (NSA) is pleased to announce the Grand Opening of the National Cryptologic Museum. As NSA’s principal gateway to the public, the newly renovated museum will provide a unique opportunity to engage with cryptologic history in fresh and innovative ways – transporting visitors on a journey from the…

Read More...

Featured Notable Technical Inquiry

Security-Conscious Password Behavior From the End-User’s Perspective

Even though technical solutions for security problems are widespread, there are no adequate security measures against precarious user behavior.  Even if hashing and encrypting are used correctly in masking the passwords, attackers can bypass these strong points by going for the weakest link.  Most likely, this will happen through sharing a password, using an already leaked password, or creating a feasibly guessable password (Olmstead and…

Learn More

UPCOMING WEBINAR

AI Risk Management Framework

What artificial intelligence tools support the Risk Management Framework process?

The Cybersecurity and Information Systems Information Analysis Center (CSIAC) is seeking to identify artificial intelligence (AI) tools that support the implementation of NIST 800-53 Risk Management Framework Revision 5. These AI tools should be capable of answering controls, validating security technical implementation guides, maintaining current documentation, and capturing artifacts in an effort to reduce manual…

Read More...
Analyst, Working, With Business Concept, Digital Transformation Technology, Analytics

Artificial Intelligence/Machine Learning (AI/ML) Tools

Artificial intelligence (AI) and machine learning (ML) are transforming the ways organizations interact with data and generate insights from it.  This report introduces key concepts present using AI for data analytics and highlights the most recent tools and platforms in the field.  Several commercial, government, or open-source software tools were identified during research.  These tools…

Read More...
Linear Accelerator Facility

Accelerating Qubit Testing With Cosmic Rays on Demand

Scientists at the Johns Hopkins Applied Physics Laboratory (APL) in Laurel, Maryland, have demonstrated a working capability that can radically accelerate the testing of qubits — the quantum computing equivalent of bits — accomplishing in a matter of minutes what has previously taken days or even weeks. As quantum computers based on superconducting qubits have…

Read More...
Researchers at Pacific Northwest National Laboratory are helping scientists understand the strengths and limits of AI network models such as the MACE model, shown here, to predict which molecules will have desirable properties for practical uses. (Image by Shannon Colson | Pacific Northwest National Laboratory)

It’s Time to Get Comfortable With Uncertainty in AI Model Training

RICHLAND, Wash.—It’s obvious when a dog has been poorly trained. It doesn’t respond properly to commands. It pushes boundaries and behaves unpredictably. The same is true with a poorly trained artificial intelligence (AI) model. Only with AI, it’s not always easy to identify what went wrong with the training. Research scientists globally are working with…

Read More...
Journalist Catherine Herridge, right, interviews Akash Jain during a panel on artificial intelligence in national security during Special Operations Forces Week 2025 in Tampa, Fla., May 7, 2026.

Experts Say Special Ops Has Made Good AI Progress, But There’s Still Room to Grow

The United States’ special operations forces community has made commendable progress in embracing and integrating artificial intelligence into the battlespace over the past year, but it still has room to grow to keep pace with adversaries like China. That was one of the key messages from the fireside chat at Special Operations Forces (SOF) Week…

Read More...
computer-circuit-board-network-lines

DARPA, State of Maryland Sign Agreement to Propel Quantum Research

DARPA and the State of Maryland have established a cooperative effort, the Capital Quantum Benchmarking Hub, to test and evaluate quantum computing prototypes and systems for national security and commercial applications. The Capital Quantum Benchmarking Hub is part of DARPA’s Quantum Benchmarking Initiative (QBI), which aims to verify and validate which, if any, quantum computing…

Read More...
ai-brain-neuron-connections

Beyond the Puzzle: Architecting Multi-Agent Systems for Generative AI

BYLINE: Soham Hans, Research Engineer, ICT After receiving my Masters in Computer Science from USC Viterbi School of Engineering, I joined ICT, to work under the supervision of Dr. Volkan Ustun in the Human-inspired Adaptive Teaming Systems (HATS) Lab. My research focus today includes multi-agent systems, procedural content generation, multi-modal LLM, multi-agent LLM, and multi-step…

Read More...
Photo illustration of U.S. Army cyber Soldier in operations center. (U.S. Army photo by Tài Doick)

S&T Is Modernizing Threat Alerts Using Artificial Intelligence

Paul Revere determined which route to ride using lantern signals – one lamp signal if the British took the land route, two if they went by water. During the Civil War, aeronautics experts started experimenting with hot air balloons to provide situational awareness. Today, our modern systems, which help monitor and secure our borders, must…

Read More...
Control Environment Laboratory Exercise (CELR) Exercise (Image source: CISA)

CISA, DHS S&T, INL, LSU Help Energy Industry Partners Strengthen Incident Response and OT Cybersecurity

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA), Department of Homeland Security (DHS) Science and Technology Directorate (S&T), and Idaho National Laboratory (INL) recently hosted Louisiana State University (LSU) and several energy industry and critical infrastructure partners to train against simulated, high-impact cyberattacks on operational technology (OT) and traditional information technology (IT) at CISA’s…

Read More...
globe-cloud-network

NETCOM Announces Transition to Army Unified Directory Service to Enhance Capabilities for Soldiers

Fort Huachuca, AZ –The United States Army Network Enterprise Technology Command (NETCOM) is excited to announce the implementation of the Army Unified Directory Service (AUDS), a cutting-edge cloud-based directory and device management solution. This transition marks a significant step in transforming Army operations and extending capabilities for the Warfighter, ensuring seamless connectivity and enhanced security…

Read More...

UPCOMING EVENTS

Public Sector Summit

Unlocking Data Power and AI Innovation in Government: Join Qlik’s annual, one-day event dedicated to empowering the Public Sector with the latest technology in data analytics, data quality, artificial intelligence (AI) and decision intelligence. Discover…

TechNet Emergence 2025

Join the TechNet Emergence 2025 conference on July 15-16, at the Hyatt Regency in Reston, Virginia, as the following topics, which have been chosen for their alignment with national priorities and cross-sector innovation opportunities, will…

Black Hat USA 2025

Black Hat USA returns to the Mandalay Bay Convention Center in Las Vegas with a 6-day program. The event will open with four days of specialized cybersecurity Trainings (August 2-5), with courses for all skill…

Voice From the Community

David, Michael 3_cropped select
Michael David

Ph.D.

Dr. David has served on the faculty of the National Intelligence University’s (NIU’s) School of Science and Technology Intelligence since February 2014. He teaches courses on cyber intelligence and information operations. He has a Ph.D. from Kyushu University, an M.S. from the University of Southern California, and a B.S. in industrial engineering from Lehigh University. Dr. David’s research emphasis is on cyber-physical systems, with a focus on hardware and software supply chain security.

Want to be featured in our Digest?

Submit your "Voice From the Community"