Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types
Free Cybersecurity Tools_Social_WEB

Free Cybersecurity Services and Tools

As part of our continuing mission to reduce cybersecurity risk across U.S. critical infrastructure partners and state, local, tribal, and…

cybersecurity maturity model certification (cmmc) (1)

Realignment of Responsibility for Cybersecurity Maturity Model Certification (CMMC) Program

On February 2, Deputy Secretary of Defense Kathleen H. Hicks directed the realignment of responsibility for the Cybersecurity Maturity Model…

3d,Rendering,Smartphone,With,Display,Emitting,Neon,Violet,Pink,Blue

Guide to Bluetooth Security – SP 800-121 Rev. 2

Bluetooth wireless technology is an open standard for short-range radio frequency communication used primarily to establish wireless personal area networks…

Capture

DoD Software Modernization Strategy Approved

The Department of Defense (DoD) Software Modernization Strategy was approved on February 1. The DoD Software Modernization Strategy sets a…

pp-energy-iiot-banner

Securing Distributed Energy Resources

Industrial Internet of Things (IIoT) devices at the grid edge are increasing rapidly and transforming the power grid. Their connectivity, the conduit through…

CS DFG

Rethinking “Man, Train, and Equip” for Information Advantage

Imagine a future where moral and cognitive battles are waged with well-crafted narratives delivered and manipulated by an intricate web…

privacy_small

Assessing Security and Privacy Controls in Information Systems and Organizations

NIST has released Special Publication (SP) 800-53A Revision 5, Assessing Security and Privacy Controls in Information Systems and Organizations. Updated…

Fiber,Optical,Cables,Connected,To,An,Optic,Ports,And,Network

CISA Publishes Infographic on Layering Network Security Through Segmentation

CISA has published an infographic to emphasize the importance of implementing network segmentation—a physical or virtual architectural approach that divides a network…

sars_cov_2_bk_0

Supercomputing Exposes Potential Pathways for Inhibiting COVID-19

To explore the inner workings of severe acute respiratory syndrome coronavirus 2, or SARS-CoV-2, researchers from the Department of Energy’s…

AFRL SME

AFRL Senior Autonomy Scientist Receives Presidential Civilian Award

Dr. Steven K. Rogers, Air Force senior scientist for autonomy, was recently selected by President Biden to receive the Presidential…

cyber-threat

CISA Urges Organizations to Implement Immediate Cybersecurity Measures to Protect Against Potential Threats

In response to recent malicious cyber incidents in Ukraine—including the defacement of government websites and the presence of potentially destructive…

afrl hanger18

New DAF software factory aims to digitally transform AFRL

The chief software officer for the Air Force recently designated Hangar 18 as a Department of the Air Force software…