Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types
Satellites

Cyberspace Security – Low Earth Orbit

As satellites become increasingly integral to global communication, navigation, and surveillance, targeting their vulnerabilities by malicious actors to disrupt services or gain sensitive information will be imminent to maintain cyberspace security.

virtual road to CMMC

The CMMC Transition and Its Cybersecurity Implications

This article provides information on the U.S. Department of Defense (DoD) Cybersecurity Maturity Model Certification (CMMC) program and where it originates.

poison apple feeding into AI

AI Hacking: Deceptive Behaviors as Cyber Weapons

In the perpetually evolving theater of modern warfare, artificial intelligence (AI) has emerged as a transformative force, promising unparalleled advancements across a spectrum of military applications.

U.S. Air Force Col. Jonathan Zall, Advanced Battle Management System Cross-Functional Team Capability Integration chief, center, answers participating industry partners questions during the Department of the Air Force’s first Decision Advantage Sprint for Human-Machine Teaming, or DASH, experiment, at the Howard Hughes Operations, or H2O, Center in Las Vegas, Nev., April 8, 2025. This two-week event brought together operational warfighters and industry and Shadow Operations Center-Nellis software developers to prototype microservices aimed at accelerating and improving decision-making in high-tempo battle management scenarios framed by the Transformational Model. (The image has been cropped to focus on the subjects.) (U.S. Air Force photo)

Air Force DASH Sprint Pioneers Human-Machine Teaming for Faster Battle Management Decisions

LAS VEGAS, Nev. – The Department of the Air Force took a bold step toward future command and control capabilities…

Members of the team who created the CURBy quantum random number generator. From left to right, Jasper Palfree (University of Colorado Boulder), Gautam Kavuri (NIST) and Krister Shalm (NIST). Credit: NIST

NIST and Partners Use Quantum Mechanics to Make a Factory for Random Numbers

Randomness is incredibly useful. People often draw straws, throw dice, or flip coins to make fair choices. Random numbers can…

U.S. Cyber Command operators participate in Cyber Guard 25-2 exercise on June 3, 2025, at Fort George G. Meade, MD. The exercise, in coordination with the Joint Staff, simulates scenarios that test response protocols and defensive and offensive techniques across geographic areas of responsibility.

USCYBERCOM Demonstrates Global Cyber Superiority With Cyber Guard 25-2

FORT MEADE, Md. — U.S. Cyber Command launched its annual training exercise Cyber Guard 25-2 on June 2, bringing together…

In a talk at Lawrence Livermore National Laboratory (LLNL) on May 30, Stanford University professor and AI visionary Fei-Fei Li traced a sweeping arc in visual intelligence and AI — a narrative she hopes ultimately leads to a more human-centered future.

Stanford Professor Discusses Future of Visually Intelligent Machines and Human-AI Collaboration

In a talk at Lawrence Livermore National Laboratory (LLNL) on May 30, Stanford University professor and AI visionary Fei-Fei Li…

OASIC seeks to vastly reduce the cost, set-up time, and support equipment overhead of large quantum research laboratories (pictured) with chipscale technologies (inset) in modular, quickly reconfigurable facilities. Source: Inset image: MIT Lincoln Laboratory; Atomic Physics Laboratory image: Mukund Vengalattore

Small Business Accelerates Transition of Quantum Tech From Lab to Market

Breakthroughs in quantum technologies for computing, sensing, and communications can take decades to transition from laboratory to real-world use. This…

data dots and waves

AI Research to Improve How We Find and Use Critical Information

The University of Maryland Applied Research Laboratory for Intelligence and Security (ARLIS), through its INSURE academic consortium, is supporting a…

This is a complicated hybrid network with multiple vulnerabilities, and you can’t just protect it with a simple firewall the way you would if all your assets were inside the Head Office. Zero trust architectures can help. (Credit: N. Hanacek/NIST)

NIST Offers 19 Ways to Build Zero Trust Architectures

If you’re trying to secure your organization’s computer network from cyberattacks, traditional approaches may not work. Gone are the days…

The U.S. Air Force MQ-9A operates from a flight test facility in the continental United States. Source: U.S. Air Force

Accelerating Cyber Resilience: Air Force, DARPA Join Forces to Strengthen Cyber Defenses

A strong, lethal military demands cutting-edge and resilient software to power every weapon and support system our U.S. Warfighters depend…

Linear Accelerator Facility

Accelerating Qubit Testing With Cosmic Rays on Demand

Scientists at the Johns Hopkins Applied Physics Laboratory (APL) in Laurel, Maryland, have demonstrated a working capability that can radically…