Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types
denial of service

CISA Releases Capacity Enhancement Guide to Strengthen Agency Resilience to DDoS Attack

CISA has released actionable guidance for Federal Civilian Executive Branch (FCEB) agencies to help them evaluate and mitigate the risk…

New ONR Mobile App Available to Download

A new mobile app from the Office of Naval Research (ONR) is just a download away – expanding ONR’s reach…

NIST to Standardize Encryption Algorithms That Can Resist Attack by Quantum Computers

Last year, the National Institute of Standards and Technology (NIST) selected four algorithms designed to withstand attack by quantum computers….

Digital Frontlines: The Marines’ Battle in the Virtual Trenches of Cyber Flag 23-2

To safeguard virtual spaces that house national secrets, power our daily lives, and influence global interactions, the United States Marine…

How NETCOM Leads the Army to a Secure Network

FORT HUACHUCA, Ariz. — Zero-trust is a collection of concepts and ideas that assume no trust exists within a defined…

Post-Quantum Cryptography: CISA, NIST, and NSA Recommend How to Prepare Now

The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and National Institute of Standards and Technology (NIST) warned…

Researchers Strengthen Defenses Against Common Cyberattack

RICHLAND, Wash.—Scientists have developed a better way to recognize a common internet attack, improving detection by 90 percent compared to…

AFRL Opens State-of-the-Art Extreme Computing Facility, Announces $44 Million in Additional Funding

Rome, N.Y. (AFRL) — — The U.S. Air Force Research Laboratory’s, or AFRL, new Extreme Computing Facility at the Information…

CISA, NSA, FBI, and International Partners Issue Advisory on the Top Routinely Exploited Vulnerabilities in 2022

In 2022, malicious cyber actors continued exploiting known software vulnerabilities to target unpatched systems and applications, including some vulnerabilities that…

DARPA AI Cyber Challenge Aims to Secure Nation’s Most Critical Software

At Black Hat USA 2023, DARPA issued a call to top computer scientists, AI experts, software developers, and beyond to…

DoD Announces Establishment of Generative AI Task Force

The U.S. Department of Defense (DoD) announced the establishment of a generative artificial intelligence (AI) task force, an initiative that…

Software Must Be Secure by Design, and Artificial Intelligence Is No Exception

Discussions of artificial intelligence (AI) often swirl with mysticism regarding how an AI system functions. The reality is far more…