Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types
soldiers working at a computer

Teaching AI What It Should and Shouldn’t Do

Thanks to the rapid growth of large language models (LLMs), artificial intelligence (AI) agents have quickly been integrated into many…

green connected network lines with NSA logo on it

NSA Issues Guidance for Using Trusted Platform Modules (TPMs)

FORT MEADE, Md. – The National Security Agency (NSA) is issuing guidance for using trusted platform modules (TPMs) to secure…

A drone is used to get a closer look at intruders at the Blue Grass Army Depot in Richmond, Ky., Sept. 18, 2024. The depot is the only Defense Department installation testing the Scylla artificial-intelligence software to enhance physical security.

Defense Department Tests AI Software, Advances to Improve Physical Security Posture

Hours before dawn, under the veil of a new moon, two figures in military fatigues grapple like Greco-Roman wrestlers within…

blue connected network lines with NSA logo on graphic

CISA, NSA, and Partners Issue Annual Report on Top Exploited Vulnerabilities

FORT MEADE, Md. – Malicious cyber actors are increasingly exploiting zero-day vulnerabilities to compromise enterprise networks, according to an annual…

CSA: Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations Graphic

Iranian Cyber Actors Access Critical Infrastructure Networks

FORT MEADE, Md. – The National Security Agency (NSA) is joining the Federal Bureau of Investigation (FBI), the Cybersecurity and…

DARPA’s Provably Weird Network Deployment and Detection (PWND2) logo with network connection graphics

A New Kind of Hidden Networking Science

Authoritarian regimes are increasingly able to monitor and target internet communications, leaving many people in those countries unable to communicate…

cyber red X

CISA and FBI Release Product Security Bad Practices for Public Comment

WASHINGTON – The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) released the Product Security Bad…

green outlines of circles interconnected with green squares

Army Announces Effort to Help Small Business Meet Cybersecurity Requirements

The Defense Department is actively working on plans to build cybersecurity requirements for the defense industrial base into defense contracts…

DHS Artificial Intelligence Roadmap 2024. Photo credit: DHS.

Feature Article: Leveraging AI to Enhance the Nation’s Cybersecurity

When you hear about AI in the news, it sounds as if the robots of science fiction will be taking…

Shown is a T-45C prototype mixed reality cockpit view. Note: Dials, displays, and out-of-the-cockpit view are virtual images while the cockpit panels and buttons are seen in the “real world” via a video pass-through camera.

Project Link: New T-45 Mixed Reality Trainer Improves Readiness

NAVAL AIR SYSTEMS COMMAND, Patuxent River, Md. – The Naval Aviation Training Systems and Ranges Program Office (PMA-205) and the…

Soldiers from the 94th Army Air and Missile Defense Command, track an unmanned aerial systems (UAS) threat during a scenario as part of Black Dart 18 on Muscatatuck Urban Training Center, Indiana.

Cloud-Based Intel Tool AIDP Rolls Out to Army Units Globally

U.S. Army intelligence units around the world are receiving the Army Intelligence Data Platform (AIDP), enabling soldiers the ability to…

The U.S. Army Research Laboratory uses the “Shaker” to conduct experiments in multiaxial vibrations and develop technology to mitigate the danger it could cause to vehicles and structures, Sept. 26, 2019.

DoD Simplifies Process for Defense Contractors to Comply With Cybersecurity Rules

The Defense Department released for public inspection the final cybersecurity maturity model certification program rule. The rule includes changes which…