Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

CISA Provides Recommendations for Protecting Information From Ransomware-Caused Data Breaches

CISA has released the fact sheet “Protecting Sensitive and Personal Information From Ransomware-Caused Data Breaches” to address the increase in…

Ethical, Legal Implications of Paying Ransoms

Ransomware has emerged as one of the most virulent cybersecurity risks. In recent years, particularly during the pandemic, ransomware attacks…

How to Defeat the Info-Warfare “Triad of Disruption”

According to this article, social media technologies, propaganda, and false news have posed unprecedented challenges to the U.S. government and…

CISA Launches New Joint Cyber Defense Collaborative

The Cybersecurity and Infrastructure Security Agency (CISA) announced the standup of the Joint Cyber Defense Collaborative (JCDC), a new agency…

Tech Training Transformation Modernizes Tech Training With Virtual Reality

JOINT BASE SAN ANTONIO-RANDOLPH, Texas (AFNS) — Futuristic training, the kind of immersive simulations seen in sci-fi TV shows, is…

Background Press Call on Improving Cybersecurity of U.S. Critical Infrastructure

A senior administration official provided an update on efforts to protect U.S. critical infrastructure from the growing, persistent, and sophisticated…

NSA, CISA, and FBI Detail Chinese State-Sponsored Actions, Mitigations

The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and Federal Bureau of Investigation (FBI) released a cybersecurity…

Automatic Proofs of Differential Privacy

Previously, we have discussed some differentially private algorithms and implementation bugs that can cause these algorithms to fail to protect…

DARPA Open Sources FETT Bug Bounty Hardware Evaluation Platform, Tools

Last year, DARPA conducted its first bug bounty program – the Finding Exploits to Thwart Tampering (FETT) Bug Bounty – to evaluate…

United States Government Launches First One-Stop Ransomware Resource at StopRansomware.gov

WASHINGTON – Today, as part of the ongoing response, agencies across the U.S. government announced new resources and initiatives to…

Hanscom AFB Team Supports ‘Revolutionary’ Zero Trust Effort

HANSCOM AIR FORCE BASE, Mass. (AFNS) — Personnel from the AFNet Sustainment and Operations Branch at Hanscom Air Force Base are partnering…

Defense Official Testifies About DOD Information Technology, Cybersecurity Efforts

John Sherman told the House Armed Services Committee’s panel on cyber, innovative technologies and information systems that cloud computing is…