Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Digital Frontlines: The Marines’ Battle in the Virtual Trenches of Cyber Flag 23-2

To safeguard virtual spaces that house national secrets, power our daily lives, and influence global interactions, the United States Marine…

How NETCOM Leads the Army to a Secure Network

FORT HUACHUCA, Ariz. — Zero-trust is a collection of concepts and ideas that assume no trust exists within a defined…

Post-Quantum Cryptography: CISA, NIST, and NSA Recommend How to Prepare Now

The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and National Institute of Standards and Technology (NIST) warned…

Researchers Strengthen Defenses Against Common Cyberattack

RICHLAND, Wash.—Scientists have developed a better way to recognize a common internet attack, improving detection by 90 percent compared to…

AFRL Opens State-of-the-Art Extreme Computing Facility, Announces $44 Million in Additional Funding

Rome, N.Y. (AFRL) — — The U.S. Air Force Research Laboratory’s, or AFRL, new Extreme Computing Facility at the Information…

CISA, NSA, FBI, and International Partners Issue Advisory on the Top Routinely Exploited Vulnerabilities in 2022

In 2022, malicious cyber actors continued exploiting known software vulnerabilities to target unpatched systems and applications, including some vulnerabilities that…

DARPA AI Cyber Challenge Aims to Secure Nation’s Most Critical Software

At Black Hat USA 2023, DARPA issued a call to top computer scientists, AI experts, software developers, and beyond to…

DoD Announces Establishment of Generative AI Task Force

The U.S. Department of Defense (DoD) announced the establishment of a generative artificial intelligence (AI) task force, an initiative that…

Software Must Be Secure by Design, and Artificial Intelligence Is No Exception

Discussions of artificial intelligence (AI) often swirl with mysticism regarding how an AI system functions. The reality is far more…

DoD Releases Plan for Implementing Cyber Workforce Strategy

In February, Deputy Defense Secretary Kathleen H. Hicks signed the U.S. Department of Defense (DoD) Cyber Workforce Strategy, which sets…

NIST Drafts Major Update to Its Widely Used Cybersecurity Framework

The world’s leading cybersecurity guidance is getting its first complete makeover since its release nearly a decade ago. After considering…

Hack-A-Sat’s Moonlighter Satellite Deploys to Low Earth Orbit After Last Month’s Successful Launch

ROME, N.Y. (AFRL) —  Moonlighter reached low earth orbit July 5 after a short visit at the International Space Station…