Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types

Defeating Malicious Cyber Actors Requires Partnerships

Participating on a panel alongside other high-level officials from the federal, state, and private sector, National Security Agency Deputy Director…

NSA, CISA Release Kubernetes Hardening Guidance

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) recently released a cybersecurity technical report, “Kubernetes…

NIST Study on Kids’ Passwords Shows Gap Between Knowledge of Password Best Practices and Behavior

NIST researchers surveyed kids in 3rd – 12th grade about their password knowledge and practices. The study found that children…

AFRL Updates Advanced Computing Tech BAA

On August 5, the U.S. Air Force Research Laboratory (AFRL) posted an updated broad agency announcement (BAA) for Advancing Computing…

CISA Provides Recommendations for Protecting Information From Ransomware-Caused Data Breaches

CISA has released the fact sheet “Protecting Sensitive and Personal Information From Ransomware-Caused Data Breaches” to address the increase in…

Ethical, Legal Implications of Paying Ransoms

Ransomware has emerged as one of the most virulent cybersecurity risks. In recent years, particularly during the pandemic, ransomware attacks…

How to Defeat the Info-Warfare “Triad of Disruption”

According to this article, social media technologies, propaganda, and false news have posed unprecedented challenges to the U.S. government and…

CISA Launches New Joint Cyber Defense Collaborative

The Cybersecurity and Infrastructure Security Agency (CISA) announced the standup of the Joint Cyber Defense Collaborative (JCDC), a new agency…

Tech Training Transformation Modernizes Tech Training With Virtual Reality

JOINT BASE SAN ANTONIO-RANDOLPH, Texas (AFNS) — Futuristic training, the kind of immersive simulations seen in sci-fi TV shows, is…

Background Press Call on Improving Cybersecurity of U.S. Critical Infrastructure

A senior administration official provided an update on efforts to protect U.S. critical infrastructure from the growing, persistent, and sophisticated…

NSA, CISA, and FBI Detail Chinese State-Sponsored Actions, Mitigations

The National Security Agency (NSA), Cybersecurity and Infrastructure Security Agency (CISA), and Federal Bureau of Investigation (FBI) released a cybersecurity…

Automatic Proofs of Differential Privacy

Previously, we have discussed some differentially private algorithms and implementation bugs that can cause these algorithms to fail to protect…