Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

U.S. Department of Defense Releases New Cyber-Resilient Weapon Systems Body of Knowledge

The U.S. Department of Defense announced today the release of the Cyber-Resilient Weapon Systems Body of Knowledge (CRWS-BoK) Portal Version…

ALIAS Equipped Black Hawk Helicopter Completes First Uninhabited Flight

The DARPA Aircrew Labor In-Cockpit Automation System (ALIAS) program completed the first-ever flight of a UH-60A Black Hawk helicopter without…

NIST Seeks Input to Update Cybersecurity Framework, Supply Chain Guidance

To keep pace with the always-evolving cybersecurity landscape, the National Institute of Standards and Technology (NIST) is planning to revise…

Are Fault-Tolerant Quantum Computers on the Horizon?

It’s been hypothesized that quantum computing will one day revolutionize information processing across a range of military and civilian applications…

Free Cybersecurity Services and Tools

As part of our continuing mission to reduce cybersecurity risk across U.S. critical infrastructure partners and state, local, tribal, and…

Realignment of Responsibility for Cybersecurity Maturity Model Certification (CMMC) Program

On February 2, Deputy Secretary of Defense Kathleen H. Hicks directed the realignment of responsibility for the Cybersecurity Maturity Model…

Guide to Bluetooth Security – SP 800-121 Rev. 2

Bluetooth wireless technology is an open standard for short-range radio frequency communication used primarily to establish wireless personal area networks…

DoD Software Modernization Strategy Approved

The Department of Defense (DoD) Software Modernization Strategy was approved on February 1. The DoD Software Modernization Strategy sets a…

Securing Distributed Energy Resources

Industrial Internet of Things (IIoT) devices at the grid edge are increasing rapidly and transforming the power grid. Their connectivity, the conduit through…

Rethinking “Man, Train, and Equip” for Information Advantage

Imagine a future where moral and cognitive battles are waged with well-crafted narratives delivered and manipulated by an intricate web…

Assessing Security and Privacy Controls in Information Systems and Organizations

NIST has released Special Publication (SP) 800-53A Revision 5, Assessing Security and Privacy Controls in Information Systems and Organizations. Updated…

CISA Publishes Infographic on Layering Network Security Through Segmentation

CISA has published an infographic to emphasize the importance of implementing network segmentation—a physical or virtual architectural approach that divides a network…