Iranian Cyber Actors Access Critical Infrastructure Networks
FORT MEADE, Md. – The National Security Agency (NSA) is joining the Federal Bureau of Investigation (FBI), the Cybersecurity and…
CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.
FORT MEADE, Md. – The National Security Agency (NSA) is joining the Federal Bureau of Investigation (FBI), the Cybersecurity and…
Authoritarian regimes are increasingly able to monitor and target internet communications, leaving many people in those countries unable to communicate…
WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released the Product Security Bad…
The Defense Department is actively working on plans to build cybersecurity requirements for the defense industrial base into defense contracts…
When you hear about AI in the news, it sounds as if the robots of science fiction will be taking…
NAVAL AIR SYSTEMS COMMAND, Patuxent River, Md. – The Naval Aviation Training Systems and Ranges Program Office (PMA-205) and the…
U.S. Army intelligence units around the world are receiving the Army Intelligence Data Platform (AIDP), enabling soldiers the ability to…
The Defense Department released for public inspection the final cybersecurity maturity model certification program rule. The rule includes changes which…
The relentless process of tracking and remediating vulnerabilities is a top concern for cybersecurity professionals. The key challenge is trying to identify a remediation scheme specific to in-house, organizational objectives. Without a strategy, the result is a patchwork of fixes applied to a tide of vulnerabilities, any one of which could be the point of failure in an otherwise formidable defense. Given that few vulnerabilities are a focus of real-world attacks, a practical remediation strategy is to identify vulnerabilities likely to be exploited and focus efforts toward remediating those vulnerabilities first.
Artificial intelligence (AI) fuels not only the technological advancements in our businesses and homes but also redefines the operational frameworks of governments, military, and the broader societal constructs. The essence of this transformative power, however, finds its most compelling narrative in leadership and organizational health, where machine learning (ML), a subset of AI, plays a pivotal role. AI/ML can be used to support leaders in their efforts to manage and monitor initiatives and drive decisions. ML algorithms using continuous data collection activities can assist and support organization’s leaders through understanding if implemented initiatives are impacting operations by improving staff cross-collaboration and productivity while improving product and service innovation. Using predictive analytics to analyze trending data to predict future outcomes, leaders can determine if staying the course or pivoting in a certain direction is needed.
As data becomes more commoditized across all echelons of the U.S. Department of Defense, developing artificial intelligence/machine-learning (AI/ML) solutions allows for advanced data analysis and processing. However, these solutions require intimate knowledge of the relevant data as well as robust test and evaluation (T&E) procedures to ensure performance and trustworthiness. This article presents a case study and recommendations for developing and evaluating small-scale AI solutions. The model automates an acoustic event location system.
Military commanders have used information throughout warfare to influence, mislead, disrupt, or otherwise affect the enemy’s decision-making and capabilities. This article discusses the history of information operations (IOs) and enduring importance of incorporating actions in the information environment in military strategy.