Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types
NETCOM lock

How NETCOM Leads the Army to a Secure Network

FORT HUACHUCA, Ariz. — Zero-trust is a collection of concepts and ideas that assume no trust exists within a defined…

post quantum nsa

Post-Quantum Cryptography: CISA, NIST, and NSA Recommend How to Prepare Now

The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and National Institute of Standards and Technology (NIST) warned…

Denial of Service Prevention

Researchers Strengthen Defenses Against Common Cyberattack

RICHLAND, Wash.—Scientists have developed a better way to recognize a common internet attack, improving detection by 90 percent compared to…

AFRL

AFRL Opens State-of-the-Art Extreme Computing Facility, Announces $44 Million in Additional Funding

Rome, N.Y. (AFRL) — — The U.S. Air Force Research Laboratory’s, or AFRL, new Extreme Computing Facility at the Information…

top vulnerabilities

CISA, NSA, FBI, and International Partners Issue Advisory on the Top Routinely Exploited Vulnerabilities in 2022

In 2022, malicious cyber actors continued exploiting known software vulnerabilities to target unpatched systems and applications, including some vulnerabilities that…

AIxCC_logoURL_619x316

DARPA AI Cyber Challenge Aims to Secure Nation’s Most Critical Software

At Black Hat USA 2023, DARPA issued a call to top computer scientists, AI experts, software developers, and beyond to…

Wired,Brain,Illustration,-,Next,Step,To,Artificial,Intelligence

DoD Announces Establishment of Generative AI Task Force

The U.S. Department of Defense (DoD) announced the establishment of a generative artificial intelligence (AI) task force, an initiative that…

Software,Development.,Internet,Security,Hacker,Prevention.,Seo,Optimization.,Modern,Tech.

Software Must Be Secure by Design, and Artificial Intelligence Is No Exception

Discussions of artificial intelligence (AI) often swirl with mysticism regarding how an AI system functions. The reality is far more…

cyber ACC

DoD Releases Plan for Implementing Cyber Workforce Strategy

In February, Deputy Defense Secretary Kathleen H. Hicks signed the U.S. Department of Defense (DoD) Cyber Workforce Strategy, which sets…

NIST CSF

NIST Drafts Major Update to Its Widely Used Cybersecurity Framework

The world’s leading cybersecurity guidance is getting its first complete makeover since its release nearly a decade ago. After considering…

hackasat LEO

Hack-A-Sat’s Moonlighter Satellite Deploys to Low Earth Orbit After Last Month’s Successful Launch

ROME, N.Y. (AFRL) —  Moonlighter reached low earth orbit July 5 after a short visit at the International Space Station…

Untitled_Goose_Tool-CF

Safeguarding the Nation With Untitled Goose Tool

LIVERMORE, Calif. — Programmers at Sandia National Laboratories are helping the Cybersecurity and Infrastructure Security Agency protect the nation through…