Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types
man thinking with graphic of locks swirling around his head

CISA Adds Three Known Exploited Vulnerabilities to Catalog

CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog based on evidence of active exploitation: CVE-2024-1212 Progress…

Heidi Massey (left), chief of U.S. Army Sustainment Command’s G6 (Information Management) directorate’s Program Management Division, meets with an employee in her division. The Program Management Division is responsible for ensuring compliance... (Sarah Ridenour)

Effective, Efficient Communication Enables Logistics Capabilities for the Warfighter

ROCK ISLAND ARSENAL, Ill. – How many times a day do you join a video conference, take a phone call,…

line of computer terminals

Everything You Always Wanted to Know About Large Language Models for Science (But Were Afraid to Ask)

Chat-GPT, DALL-E and other artificial intelligence (AI) tools based on large language models (LLMs) are causing seismic shifts in the…

man with headphones on standing next to computer terminal

Standing Guard Against Network Invaders

Anyone who has flown on a commercial flight, crossed an international border, visited a government building, or attended a concert…

soldiers working at a computer

Teaching AI What It Should and Shouldn’t Do

Thanks to the rapid growth of large language models (LLMs), artificial intelligence (AI) agents have quickly been integrated into many…

green connected network lines with NSA logo on it

NSA Issues Guidance for Using Trusted Platform Modules (TPMs)

FORT MEADE, Md. – The National Security Agency (NSA) is issuing guidance for using trusted platform modules (TPMs) to secure…

A drone is used to get a closer look at intruders at the Blue Grass Army Depot in Richmond, Ky., Sept. 18, 2024. The depot is the only Defense Department installation testing the Scylla artificial-intelligence software to enhance physical security.

Defense Department Tests AI Software, Advances to Improve Physical Security Posture

Hours before dawn, under the veil of a new moon, two figures in military fatigues grapple like Greco-Roman wrestlers within…

blue connected network lines with NSA logo on graphic

CISA, NSA, and Partners Issue Annual Report on Top Exploited Vulnerabilities

FORT MEADE, Md. – Malicious cyber actors are increasingly exploiting zero-day vulnerabilities to compromise enterprise networks, according to an annual…

CSA: Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations Graphic

Iranian Cyber Actors Access Critical Infrastructure Networks

FORT MEADE, Md. – The National Security Agency (NSA) is joining the Federal Bureau of Investigation (FBI), the Cybersecurity and…

DARPA’s Provably Weird Network Deployment and Detection (PWND2) logo with network connection graphics

A New Kind of Hidden Networking Science

Authoritarian regimes are increasingly able to monitor and target internet communications, leaving many people in those countries unable to communicate…

cyber red X

CISA and FBI Release Product Security Bad Practices for Public Comment

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released the Product Security Bad…

green outlines of circles interconnected with green squares

Army Announces Effort to Help Small Business Meet Cybersecurity Requirements

The Defense Department is actively working on plans to build cybersecurity requirements for the defense industrial base into defense contracts…