Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

U.S. and International Partners Publish Secure-by-Design and Default Principles and Approaches 

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), the National Security Agency (NSA),…

NTIA Seeks Public Input to Boost AI Accountability

WASHINGTON – The Department of Commerce’s National Telecommunications and Information Administration (NTIA) launched a request for comment (RFC) to advance…

CISA’s Pre-ransomware Notifications Help Organizations Stop Attacks Before Damage Occurs

Over the past several years, ransomware attacks have caused extraordinary harm to American organizations:  schools forced to close, hospitals required…

Show Us the Proof: Formal Methods Can Be Applied at Large Scale

Engineering practices for software-reliant systems have evolved steadily over many decades, and so too have the assurance techniques that confirm…

NIST’s National Cybersecurity Center of Excellence Renews Partnerships With State, County

ROCKVILLE, Md. — The Department of Commerce’s National Institute of Standards and Technology (NIST), the state of Maryland, and Montgomery…

DARPA Seeks Input to Advance Hybrid Quantum/Classical Computers

Although fault-tolerant quantum computers are projected to be years to decades away, processors made from tens to hundreds of quantum…

Four Years Later: The Impacts of Ghidra’s Public Release

FORT MEADE, Md. — Four years ago at the 2019 RSA Conference, the National Security Agency (NSA) released Ghidra, a…

Senators Rosen, Blackburn Debut Cyber “Reserve” Workforce Bills

WASHINGTON, DC – U.S. Senators Jacky Rosen (D-NV) and Marsha Blackburn (R-TN) are introducing a legislative package of two bills…

Hackers Could Try to Take Over a Military Aircraft; Can a Cyber Shuffle Stop Them?

ALBUQUERQUE, N.M. — A cybersecurity technique that shuffles network addresses like a blackjack dealer shuffles playing cards could effectively befuddle…

Is Your Cybersecurity Strategy Falling Victim to These Six Common Pitfalls?

Here’s a pop quiz for cybersecurity pros: Does your security team consider your organization’s employees to be your allies or…

Join DARPA to Reimagine the Future of AI for National Security

How do we build artificial intelligence and machine learning systems that people can trust? DARPA wants to answer this question…

Representatives Introduce “Internet of Things” Legislation to Prepare US for Future Demand

Representatives Suzan DelBene (WA-01) and John Katko (NY-24) reintroduced the Internet of Things (IoT) Readiness Act, bipartisan legislation that would…