Articles

CSIAC collects and publishes articles related to our technical focus areas on the web to share with the DoD community.

Filter by Technical Focus Areas

By default, only content within your selected technical focus areas is displayed throughout the site. You can update your technical focus areas in your profile or temporarily filter the content here.


Filter by Article Types
Cloud Computing

U.S. Air Force Research Laboratory Partners With Google Cloud to Accelerate Collaboration and Drive Research Mission Success

Google Cloud announced November 3 that the U.S. Air Force Research Laboratory has chosen to deploy Google Workspace as a…

Strategic Direction for Cybersecurity Maturity Model Certification (CMMC) Program

The Department of Defense announced the strategic direction of the Cybersecurity Maturity Model Certification (CMMC) program, marking the completion of…

NSA and CISA Provide Cybersecurity Guidance for 5G Cloud Infrastructures

The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have published cybersecurity guidance to securely build…

Ongoing Cyber Threats to U.S. Water and Wastewater Systems

This joint advisory is the result of analytic efforts between the Federal Bureau of Investigation (FBI), the Cybersecurity and Infrastructure…

Army-Wide Planning Team Tackles Next Steps for Talent Modernization

Army modernization is not just about materiel or capabilities solutions – it is also about modernizing the talent pool responsible…

Historic Deployment of Cyber Forces With Bomber Task Force Europe

In a historic deployment, a U.S. Cyber Command Cyber Protection Team (CPT) defended critical data on B-1B Lancers assigned to…

NIST Seeks Public Input on Consumer Software Labeling for Cybersecurity

In an effort to improve consumers’ ability to make informed decisions about software they purchase, the National Institute of Standards…

Avoid Dangers of Wildcard TLS Certificates, the ALPACA Technique

NSA released the Cybersecurity Information Sheet, “Avoid Dangers of Wildcard TLS Certificates and the ALPACA Technique” today, warning network administrators…

CISA, FBI, and NSA Release Joint Cybersecurity Advisory on BlackMatter Ransomware

CISA, the Federal Bureau of Investigation (FBI), and the National Security Agency (NSA) have released joint Cybersecurity Advisory (CSA): BlackMatter Ransomware….

Securing the Industrial Internet of Things

The Industrial Internet of Things (IIoT) refers to the application of instrumentation and connected sensors and other devices to machinery…

Americans Need a Bill of Rights for an AI-Powered World

In the past decade, data-driven technologies have transformed the world around us. We’ve seen what’s possible by gathering large amounts…

Summit Highlights DoD’s Cybersecurity Initiatives, Challenges

Some of the cybersecurity challenges the Defense Department faces and some of its key initiatives include the highlight of a…